0% found this document useful (0 votes)
135 views7 pages

CS3492 Database Management Systems Overview

The document outlines the syllabus for a Database Management Systems course, covering topics such as DBMS architecture, SQL commands, relational databases, normalization, transactions, query optimization, and advanced database topics including distributed databases and security. It includes detailed questions and tasks for each unit, emphasizing practical applications and theoretical understanding. The course is structured into five units with various parts focusing on different aspects of database management and design.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views7 pages

CS3492 Database Management Systems Overview

The document outlines the syllabus for a Database Management Systems course, covering topics such as DBMS architecture, SQL commands, relational databases, normalization, transactions, query optimization, and advanced database topics including distributed databases and security. It includes detailed questions and tasks for each unit, emphasizing practical applications and theoretical understanding. The course is structured into five units with various parts focusing on different aspects of database management and design.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

GANADIPATHY TULSIS JAIN ENGINEERING COLLEGE

DEPARTMENT OF INFORMATION TECHNOLOGY


IV- Semester CS3492 – DATABASE MANAGEMENT SYSTEMS
UNIT-I (Relational Database)
UNIT-I PART – B

1. Explain DBMS Architecture with an example.


2. Explain the various types of SQL commands. Discuss the features
of SQL
3. Explain Embedded SQL , Dynamic SQL & Advanced SQL Features
with its applications.
4. Explain the different types of keys used in DBMS.
5. Relational Algebra – Select, Project, Cartesian product, Set &Join
Operation

[Link] is Procedural Query Language? Explain the various operations


performed using relational operators. (13)

5.
3. [Link] Data Models. Relational Models & Keys
4. SQL fundamentals – parts of SQL & Structure of SQL
5. 11
6. Advanced SQL & Embedded SQL

Various Model with Example


6. Explain Relational Databases with examples. (13)
7. Draw a Schema and mention the various elements of the schema
with examples (13)
(13)
PART – C
1. Consider the following relations for a company database Application.
Employee (Eno, Name, Sex, DOB, Doj, Designation, Basic_Pay,
Dept_No) Department (DeptNo, Name)
Project (ProjNo, Name, Dept_No)
Works for (Eno,ProjNo,Date, Hours)
The attributes specified for each relation is self-explanatory. However
the business rules are stated as follows. A department can control a
project. An employee can work on any number of projects on a day.
However an employee cannot work more than once on a project he/she
worked on that day. The primary key are underlined. (i). Identify the
foreign keys, Develop DDL to implement the above schema.
(ii)Develop an SQL query to list the department number and the
number of Employee in each department. (iii)Develop a View that will
keep track of the department number, the number of employees in the
department, and the total basic pay expenditure for each department.
(iv)Develop an SQL query to list the details of employees who have
worked in more than three projects on a day.(15)

[Link] the following table Degree(degcode, name, subject)


Candidate(seatno, degcode, semester, month, year, result)
Marks(seatno, degcode, semester, month, year, papcode, marks)
Degcode-degree code, Name-name of the degree (MSc, MCOM)
Perform various query operations using SQL: (i) Write a SELECT
statement to display all the degree codes which are there in the
candidat table but not present in degree table in the order of degcode.
(ii) Write a SELECT statement to display the name of all the candidates
who have got less than 40 marks in exactly 2 subjects. (iii)Write a
SELECT statement to display the name, subject and number of
candidates for all degrees in which there are less than 5 candidates.
(iv) Write a SELECT statement to display the names of all the
candidates who have got highest total marks in MSc.,(Maths) (15)

UNIT-II (Database Design)


PART A
[Link] entity and relationship set.
[Link] Cardinality.
[Link] is weak entity?
[Link] Functional Dependency.
[Link] is Multivalued Dependency?
[Link] the properties of Decomposition.
[Link] is a Relational Mapping?
[Link] Normalization.
[Link] is the difference between unique and primary key?
[Link] is domain key normal form?
11 What is transitive functional dependency?
12 Define 1NF with an example.
13 Define 2NF with an example.
14 Define 3NF with an example.
15 Define BCNF with an example.
16 Define 4NF with an example.
17 Define 5NF with an example.
18 Boyce-Codd normal form is found to be stricter than 3NF’. Justify
the statement
19 Draw an ER model showing one-to-many relationship.
20 Draw an ER model showing many-to-many relationship.
UNIT-II PART – B
1. Draw an ER model by taking Hospital management/Banking
System/University Database and explain all the relationship sets with
cardinality. (13)
2. Explain EER Model with a neat sketch for School Database. (13)
3. Explain various functional dependencies of an ER model with an
example (13)
4. What is Normalization? Explain 1NF, 2NF, 3NF, BCNF, 4NF, 5NF with
examples(13)
5. Explain the concept of Non-Loss Decomposition with an example
(13)
[Link] in detail the steps involved in the ER – to Relational mapping
in the process of relational database design (13)
7. Explain with suitable example, the constraints of specialization and
generalization in ER data modelling. (13)
PART – C
1. Draw E – R Diagram for the “Restaurant Menu Ordering System”,
which will Facilitate the food items ordering and services within a
restaurant. The entire restaurant scenario is detailed as follows. The
Customer is able to view the food items menu, call the waiter, place
orders and obtain the final bill through the computer kept in their
table. The waiters through their wireless tablet PC are able to initialize
a table for customers, control the table functions to assist customers,
orders, send orders to food preparation staff (chef) and finalize the
customer’s bill. The food preparation staffs (Chefs), with their touch-
display interface to the system, are able to view orders sent to the
kitchen by waiters. During preparation, they are able to let the waiter
know the status of each item, and can send notification when items are
completed. The system should have full accountability and logging
facilities, and should support supervisor actions to account for
exceptional circumstances, such as a meal being refunded or walked
out on. (15)
2. A car rental company maintains a database for all vehicles in its
current fleet. For all vehicles, it includes the vehicle identification
number, license number, manufacturer, model, date of purchase, and
color. Special data are included for certain types of vehicles.  Trucks:
cargo capacity.  Sports cars: horsepower, renter age requirement. 
Vans: number of passengers.  Off-road vehicles: ground clearance,
drivetrain (four- or two-wheel drive). Construct an ER model for the car
rental company database
UNIT-III(Transactions)
PART A
[Link] Transaction.
[Link] the types of failures.
[Link] is average response time?
[Link] the need of time stamps.
[Link] strict two phase locking protocol and rigorous two phase
locking protocol.
[Link] are the different modes of lock?
[Link] deadlock.
[Link] Concurrency
[Link] the phases of two phase locking protocol.
[Link] are uncommitted modifications?
11 What is Shadow Paging?
12 Define ARIES. List the various phases of ARIES.
13 What is serializability?
14 What do you mean by phantom problem?
15 What is an isolation level?
16 List the various Recovery techniques.
17 What is deferred update in recovery?
18 Define Validation.
19 What is Snapshot isolation?
20 Define Scheduling.
UNIT-III PART – B
1. Discuss view serializability and conflict serializability. (13)
2. Briefly describe two phase locking in concurrency control
techniques. (13)
3. Explain the concepts of concurrent execution in Transaction
processing system. (13)
4. Brief the ACID properties. Explain Transactions with SQL support for
a banking application (13)
5. What is concurrency control? How is it implemented in DBMS?
Illustrate with a suitable example. (13)
[Link] explain about Two phase commit and three phase commit
protocols. (13)
7. What is deadlock? How does it occur? How transactions be written to
(i) Avoid deadlock (ii) Guarantee correct execution. Illustrate with
suitable example. (13)
8. (i) Narrate the actions that are considered for deadlock detection
and the recovery from deadlock (ii) Discuss the properties of a
transaction that ensure integrity of data in the database system. (13)
9. Write Short notes on (i)Validation and Snapshot Isolation. (ii)
Multiple Granularity locking. (13)
[Link] is Recovery? Explain various recovery techniques during
transactions in detail [Link] Short notes on (i) Shadow Paging. (ii)
ARIES Algorithm. (13)
PART – C
1. Consider the following extension to the tree-locking protocol, which
allows both shared and exclusive locks:  A transaction can be either a
read-only transaction, in which case it can request only shared locks,
or an update transaction, in which case it can request only exclusive
locks.  Each transaction must follow the rules of the tree protocol.
Read-only transactions may lock any data item first, whereas update
transactions must lock the root first. Show that the protocol ensures
serializability and deadlock freedom. (15)
2. Consider the following schedules. The actions are listed in the order
they are schedule, and prefixed with transaction name. S1: T1: R(X),
T2: R(x), T1: W(Y), T2: W(Y), T1: R(Y), T2: R(Y) S2:T3: R(X), T1: R(X), T1:
W(Y), T2: R (Z), T2: W (Z), T3: R (Z) For each of the schedules, answer
the following questions:  What is the precedence graph for the
schedule?  Is the schedule conflict-serializable? If so, what are all the
conflict equivalent serial schedules?  iii. Is the schedule view-
serializable? If so, what are all the view equivalent serial schedules?
(15)
UNIT-IV(Implementation Techniques)
PART A
[Link] the various heuristics involved in query optimization.
[Link] the various types of record organizations in a file.
3. Draw the storage device hierarchy.
4. What is RAID?
5. List the factors to be taken into account in choosing a RAID system.
6. Mention the various types of file organization with ex.
7. What are the two basic kinds of indices?
8. Differentiate clustering index and non-clustering index
9. What is a balanced tree?
10Write a query for B+ tree.
11Define a bucket.
12Define hash function.
13What is dynamic hashing?
14List the steps involved in query processing.
15Which cost components are used for cost function estimation?
16What is replication transparency?
17State the need for query optimization.
18Differentiate left join and right join.
19What is Outer join? Give example.
20Differentiate Data Dictionary Storage and Column Oriented Storage.
UNIT-IV PART – B
1. Explain how the RAID systems improve performance and reliability.
(13)
2. What is RAID? List the different level in RAID technology and explain
its Features with neat sketches. (13)
3. Describe the structure of B+ tree and list the characteristics of a
B+tree with indexing operation. (13)
4. Explain the steps involved in Query Processing with a neat sketch.
(13)
5. Discuss static hashing and dynamic hashing with examples. (13)
[Link] in detail about how records are represented in a file and how
to organize them in a file. (13)
7. Explain the cost estimation for query processing. (13)
8. Discuss the selection, sorting and join operations using appropriate
algorithms. (13)
9. Explain the various heuristics involved in query optimization. (13)
[Link] B tree indexing with an example. (13)

PART – C
1. Explain the various steps involved for Select Operation with
example. (15)
2. Explain the various steps involved for Join Operation with example.
(15)
3. Explain Cost-based optimization with example. (15)

UNIT-V(Advanced Topics)
PART A
[Link] are Distributed Databases?
[Link] Filtering and Polinstantiation.
[Link] the different types of security problem.
[Link] is discretionary access control?
[Link] is mandatory access control?
[Link] is NOSQL database?
[Link] CAP Theorem.
[Link] are the advantages of distributed databases?
[Link] the issues of distributed databases.
[Link] the various utilities of graph databases.
11 What is a threat in DBMS?
12 What are the various security metrics used for statistical
databases?
13 What is SQL Injection?
14 How to encrypt a database system? Illustrate with an example.
15 List the open challenges faced in securing a database system.
16 What are Document based systems?
17 What are Column based systems?
18 Define role based access.
19 State the needs for encrypting a database system.
20 What are Graph Databases? Give examples
UNIT-V PART – B
1. Explain in detail about Distributed Databases with a neat sketch.
(13)
2. Discuss the query processing and optimization for a transaction in
Distributed Databases. (13)
3. Explain NOSQL databases with applications. (13)
4. Explain about the various threats and risks in Database
Management Systems(13)
5. Discuss about various Access Control Mechanisms and Efficient
Methods to Secure the Databases. (13)
6. Write Short notes on (i) CAP Theorem. (ii) Key Value Stores. (13)
7. Write Short notes on (i) Column based systems (ii) Graph Databases
(13)
8. What is Statistical Database? Explain the security measures involved
for having uniqueness of access. (13)
9. Explain the encryption techniques used for securing a database
system. (13)
[Link] Discretionary Access control based on Granting and
Revoking Privileges.
[Link] about the Federation of Distributed Database Systems (13)
[Link] SQL Injection Methods with an example. (13)
PART – C
1. Explain the Granting and Revoking Privileges in a Distributed
Database with example.
2. Discuss the Risks associated with SQL Injection Methods with
suitable Preventive measures. (15)
3. Explain the various types of NOSQL Database systems (15)

Common questions

Powered by AI

Relational databases use a structured schema with tables and rows, relying on relations and constraints, which is suitable for transactional applications requiring consistency and integrity . NoSQL databases, on the other hand, offer flexible schema designs like key-value, document, or graph-based models, and are better suited for applications needing scalability and handling of semi-structured or unstructured data . NoSQL excels in large-scale data environments such as social media platforms or real-time analytics, while relational databases are ideal for traditional applications such as financial records.

Concurrency control improves transaction processing by allowing multiple transactions to occur simultaneously without conflicts, ensuring data correctness and consistency. Locking protocols such as the Two-Phase Locking (2PL) play a crucial role by ensuring that no two transactions can access the same data concurrently unless they are only reading. This prevents conflicts and maintains consistency even in high concurrency environments. 2PL involves acquiring all necessary locks before any data changes are initiated, ensuring a strict order to transaction execution .

The DBMS architecture, known as the three-tier architecture, facilitates efficient database management by dividing management tasks into distinct layers: the internal, conceptual, and external layers. The internal layer manages physical storage, the conceptual layer defines logical structure, and the external layer provides user views. This separation allows for data abstraction and encapsulation, improving scalability and manageability . An example of this can be seen in how users interact with databases through interfaces that do not expose the complexity of physical storage management.

Statistical databases face unique security concerns like data inference, where users deduce sensitive information from statistical queries, and privacy violation risks from aggregated answers. To address these issues, access controls can be implemented to limit the types and numbers of queries a user can perform, and query restrictions can be applied to prevent results that can reveal individual data entries. Techniques such as adding noise to results or query auditing are also used to ensure privacy, helping safeguard sensitive information while allowing statistical analysis .

Query optimization in DBMS involves selecting the most efficient strategy for executing a query. This process considers factors like response time and resource utilization. RAID systems improve performance by distributing data across multiple disks, allowing parallel reads/writes, which enhances query performance significantly. RAID also enhances reliability through redundancy; for example, RAID-1 mirrors identical data on two or more drives, ensuring data availability even if one disk fails . By combining query optimization strategies with RAID's performance and reliability features, DBMS can efficiently handle high-volume operations.

Transaction management ensures data integrity by adhering to the ACID properties: Atomicity, Consistency, Isolation, and Durability. Atomicity ensures that all operations within a transaction are completed; if any fail, changes are rolled back. Consistency ensures that transactions transform databases from one valid state to another. Isolation ensures that no transaction can interfere with another transaction. Durability means changes made in a transaction are permanent even in the event of system failures . By adhering to these properties, DBMS maintains accurate and reliable data even during concurrent transactions.

Embedded SQL is used to combine SQL code directly into procedural languages to provide a seamless way to execute SQL within application code . It is suitable for applications needing smooth interaction between SQL and host languages. Dynamic SQL, in contrast, allows SQL statements to be created and executed at runtime, which is useful for applications requiring flexibility in query formation . Advanced SQL encompasses features like procedural extensions for creating complex reports, which are suitable for data analytics applications . Each type of SQL has distinct strengths making them better suited for specific application needs.

Distributed databases are significant in modern IT architectures because they allow for data to be stored in multiple locations, increasing system availability, fault tolerance, and load distribution, which is essential for large-scale applications like global e-commerce platforms . However, challenges include maintaining data consistency across nodes, managing network latency, and ensuring robust security across distributed sites. Implementing distributed databases involves sophisticated algorithms to handle concurrency and recovery, and often requires reconciliation mechanisms for conflict resolution due to data propagation delays.

SQL views play a significant role in managing and securing database access by providing a virtual table representing a subset of data from one or more tables. Views can limit the exposure of sensitive data by showing only specific fields necessary for users, thereby enhancing security . For example, a view can be created to limit the columns and rows visible to a user, allowing access only to non-sensitive employee data such as department and job title while omitting personal details like salary.

Normalization in database design is crucial for reducing redundancy and dependency, which optimizes storage space and improves data integrity. The Third Normal Form (3NF) ensures that all attributes are functionally dependent on primary keys without transitive dependencies. Boyce-Codd Normal Form (BCNF) is stricter than 3NF because it requires every determinant to be a candidate key, providing a higher normalization level that eliminates more redundancy . While 3NF suffices for most databases, BCNF is required for cases with more complex integrity constraints.

You might also like