0% found this document useful (0 votes)
252 views2 pages

Database Management System November 2025 Question Paper

This document is an examination paper for the CS-502 Database Management System course for T.Y.B.Sc. (Computer Science) students, scheduled for November 2025. It includes instructions, a total of 6 pages, and a variety of questions covering topics such as database keys, normalization, SQL commands, and database architecture. The exam consists of multiple-choice questions, short answer questions, and detailed essay questions, with a total of 60 marks available.

Uploaded by

Mayur Gurav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
252 views2 pages

Database Management System November 2025 Question Paper

This document is an examination paper for the CS-502 Database Management System course for T.Y.B.Sc. (Computer Science) students, scheduled for November 2025. It includes instructions, a total of 6 pages, and a variety of questions covering topics such as database keys, normalization, SQL commands, and database architecture. The exam consists of multiple-choice questions, short answer questions, and detailed essay questions, with a total of 60 marks available.

Uploaded by

Mayur Gurav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Seat Number : (To be filled by student)

CS–502
Database Management System
(852402)
[Link]. (Computer Science) – Regular (CBCS June 2019 Pattern)

November 2025 Examination

Total Pages : 6
Time : 2 Hours Max. Marks : 60

Note :
1. Do not write anything on the question paper except Seat No.
2. All questions are compulsory.
3. Figures to the right indicate full marks.
4. Students should note, no supplement will be provided.
5. Graphs or diagrams should be drawn with a black ink pen or HB pencil.

Q.1 (A) Attempt any six of the following : (6 × 1 = 6 marks)

1. Which of the following is not a type of database key? (a) Primary (b) Alternate (c) Derived (d) Foreign
2. The process of converting ER-diagram into tables is known as — (a) Normalization (b) Mapping (c) Abstraction
(d) Integration
3. Which SQL clause is used to filter records? (a) WHERE (b) SELECT (c) ORDER BY (d) GROUP BY
4. A collection of interrelated data is called — (a) Database (b) Dataset (c) Data view (d) Schema
5. The command to remove all records from a table but keep its structure is — (a) DELETE (b) REMOVE (c)
TRUNCATE (d) DROP
6. Which of the following is not a type of join? (a) Inner (b) Outer (c) Self (d) Direct
7. Which normalization form removes transitive dependency? (a) 1NF (b) 2NF (c) 3NF (d) BCNF
8. The portion of the database that a user can view is called — (a) Physical schema (b) View (c) Logical schema
(d) Subschema

Q.1 (B) Attempt any six of the following : (6 × 1 = 6 marks)

1. Define DBMS.
2. What is a foreign key?
3. Define data redundancy.
4. What is relational algebra?
5. Define entity and attribute.
6. What is a transaction?
7. Define normalization.
8. What is a schema in DBMS?

Q.2 Attempt any six of the following : (6 × 2 = 12 marks)

1. Explain the advantages of DBMS over a file system.


2. Define and explain different types of database users.
3. What is a weak entity? Give an example.
4. Explain COMMIT and ROLLBACK commands.
5. Write a short note on ACID properties.
6. What is serializability? Explain with an example.
7. Explain the role of DBA in database management.
8. What are DDL and DML? Give examples of each.
9. Define concurrency control. Why is it needed?

Q.3 Attempt any four of the following : (4 × 3 = 12 marks)

1. Describe different types of database models with examples.


2. Explain various levels of data abstraction with a neat diagram.
3. Explain inner, outer, and natural joins with examples.
4. Write a short note on functional dependency.
5. Discuss different types of data integrity constraints.
6. Explain the use of indexes in DBMS.

Q.4 Attempt any three of the following : (3 × 4 = 12 marks)

1. Draw and explain the ER diagram for a Library Management System.


2. Explain different types of normalization up to 3NF with examples.
3. Discuss the difference between static and dynamic hashing.
4. What are recovery techniques in DBMS? Explain shadow paging.
5. Write short notes on: (a) Deadlock prevention (b) Log-based recovery.

Q.5 Attempt any two of the following : (2 × 6 = 12 marks)

1. Discuss various database architectures – single-tier, two-tier, and three-tier.


2. What is data security? Explain different techniques to secure a database.
3. Write a detailed note on transaction states with a neat diagram.

Common questions

Powered by AI

A Database Administrator (DBA) is responsible for the performance, integrity, and security of a database. The role involves database design, implementation, maintenance, and repair. DBAs ensure databases are protected through backups, maintain data standards, optimize database performance, troubleshoot issues, and provide user access control. DBAs also periodically update systems and handle any migrations or upgrading of the database in response to new tools or needs .

Data abstraction in a DBMS is represented by three levels: the physical level, logical level, and view level. The physical level defines how data is stored physically in the database. The logical level describes what data is stored in the database and the relationships among those data, usually represented with ER diagrams. The view level is the highest level of data abstraction and presents only a part of the database relevant to a particular user, abstracting the complexities of the underlying data organization. This multi-layered approach allows different users to interact with the database conveniently without dealing with physical storage details .

ACID properties stand for Atomicity, Consistency, Isolation, and Durability, which ensure reliable processing of database transactions. Atomicity ensures that transactions are completed entirely or not at all. Consistency guarantees that a transaction takes the database from one valid state to another. Isolation keeps transactions separate until they're completed, preventing intermediate transactions from affecting other transactions, while Durability ensures that once a transaction is committed, it remains so even in the event of a failure. These properties are crucial for maintaining database integrity and consistency, especially in concurrent user environments .

A weak entity is an entity that cannot be uniquely identified by its own attributes alone and relies on a "strong" or "owner" entity. In a database model, a weak entity is represented with a dashed border in an entity-relationship diagram, and its existence depends on a strong relation identified via a foreign key. Additionally, a weak entity has a partial key, underlined with a dashed line, and participates in a relationship with a strong entity, ensuring referential integrity .

Static hashing maps search keys to fixed hash bucket addresses, leading to potential overflow issues as new records are added, hence requiring overflow buckets. Dynamic hashing adjusts the hash function as records increase, allowing the hash table to grow dynamically. It uses structures like extendible hashing, which split or merge pages, reducing overflow problems and offering better space utilization. Dynamic hashing is preferred in environments with frequent insertions, deletions, and updates due to its ability to adapt without compromising on performance and space .

COMMIT and ROLLBACK are SQL commands used to manage transactions. COMMIT saves all changes made during the transaction to the database, making them permanent and visible to other users. ROLLBACK, on the other hand, is used to undo changes made during the transaction, restoring the database to its previous state before the transaction began. These commands ensure the integrity and consistency of the database by allowing controlled commit and undo actions of transaction data .

The process of converting an ER-diagram into tables, known as Mapping, involves creating tables for each entity, converting relationships into tables or foreign keys, and defining attributes within tables. Each entity becomes a table, where entity attributes turn into columns. Relationships can require the creation of additional tables or foreign keys to link two entities directly, depending on their cardinals. This transformation helps in structuring the logical design based on the conceptual model outlined by the ER-diagram .

DBMS offers advantages over traditional file systems by providing data redundancy control, consistent data representation, efficient data accessibility, and improved data security. It ensures data integrity and enables concurrent data access by multiple users, while file systems typically lack these advanced features and require individual application handling of data redundancy and consistency issues .

Concurrency control is essential for maintaining database integrity in multi-user environments. It manages simultaneous execution of transactions to prevent conflicts when accessing shared data resources. By utilizing mechanisms like locking protocols and timestamp ordering, it ensures that transactions execute in a manner that is serializable, preventing phenomena like lost updates, temporary inconsistencies, or uncommitted data visibility, thus maintaining consistent state across database operations and users .

Normalization is a process to eliminate data redundancy and ensure data dependencies. The 1NF (First Normal Form) removes repeating groups by ensuring all attributes are atomic; for example, separate a column with multiple emails into individual columns. The 2NF (Second Normal Form) eliminates partial dependencies, ensuring all nonprime attributes are fully functionally dependent on the primary key, applied when a table with a composite key contains non-prime attributes only depending on a part of the key. Finally, 3NF (Third Normal Form) removes transitive dependencies, meaning non-key attributes should not depend on other non-key attributes—for instance, if a table includes employee ID, department name, and manager ID, and department name depends on manager ID, you must separate it .

You might also like