Two Marks: Unit: 1
Two Marks: Unit: 1
Bankingb)
Airlinesc)
Universitiesd)
Tele communicationf)
Financeg)
Salesh)
Manufacturingi)
Human resources
3.
Data isolationd)
Integrity problemse)
Atomicity problemsf)
a)
Controlling redundancyb)
Physical levelb)
logical levelc)
view level
6.
Transaction managerc)
File managerd)
Buffer manager
12.
Data filesb)
Data dictionaryc)
indices
14.
Entity setii)
Entity typeii)
i)
Key attributeii)
One to one
•
One to many
•
Many to one
•
Many to many
28.
Total:
The participation of an entity set E in a relationship set R is said tobe
total
if every entity in E participates in at least one relationship in R.
•
Partial:
if only some entities in E participate in relationships in R, theparticipation of entity
set E in relationship R is said to be
partial.29.
DDLii)
DMLDDL:
Data base schema is specified by a set of definitions expressed by a
speciallanguage called a data definition language.
DML:
A data manipulation language is a language that enables users to access
ormanipulate data as organized by the appropriate data model.
30.
Attributes:
column headers
•
Tuple
: Row32.
Define the term relation
.Relation is a subset of a Cartesian product of list domains.
33.
40.
t[A]
→
the value of tuple ‘t’ on attribute, A
•
t
∈
r
→
tuple ‘t’ is in relation ‘r’
•
→
there existsDefinition for ‘there exists’ (
∃
):
∃
t
∈
r(Q(t))which means there exists a tuple ‘t’ in relation ‘r’such that predicate Q(t) is
true.
•
→
for allDefinition for ‘for all’ (
∀
):
∀
t
∈
r(Q(t))which means Q(t) is true for all tuples ‘t’ in relation‘r’.
•
⇒
→
ImplicationDefinition for Implication (
⇒
):P
⇒
Q means if P is true then Q must be true.
42.
UNIT: 2
RELATIONAL MODEL RELATIONAL MODEL RELATIONAL
MODEL RELATIONAL MODEL
1.
What are the parts of SQL language?
The SQL language has several parts:
View definition
Transaction control
Embedded SQL
Integrity
Authorization
2.
Select
From
where
4.
Concatenation3)
Union2)
Intersect operation3)
Average: avg
Minimum: min
Maximum: max
Total: sum
Count: count
11.
v
as <query expression>
14.
Deletion
Insertion
Updates
Update of a view
16.
Commit work
Rollback work
17.
What is transaction?
Transaction is a unit of program execution that accesses and possibly
updatedvarious data items.
18.
List the SQL domain Types?
Key declarations
Form of a relationship
21.
What is trigger?
Triggers are statements that are executed automatically by the system as the
sideeffect of a modification to the database.
22.
What is the need for triggers?Triggers are useful mechanisms for alerting humans
or for starting certain tasksautomatically when certain conditions are met.
27.
The triggers can be initiated before the event or after the event.
29.
Read authorization
Write authorization
Update authorization
Drop authorization
32.
Index authorization
Resource authorization
Alteration authorization
Drop authorization
34.
35.
Database system
Operating system
Network
Physical
human
36.
Delete
Select
Insert
update
37.
All privileges granted to roles that have been granted to the user or role.
38.
The code for checking authorization becomes intermixed with the rest of
theapplication code.
DES
AES
Public key encryption
40.
Digital signatures
Nonrepudiation
42.
43.
β
holds on relational schema R if in any legal relation r(R), for all pairs of tuples t1
and t2 in r such that t1 [
α
] =t1 [
α
], and also t1 [
β
] =t2 [
β
].
46.
What are the uses of functional dependencies?
To test relations to see whether they are legal under a given set of
functionaldependencies.
β
is trivial if
β
C
α
. Trivial functionaldependencies are satisfied by all the relations.
48.
Minimizing redundancy
51.
Lossless-join decomposition
Dependency preservation
Repetition of information
54.
What is 2NF?
A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in
Ris fully functionally dependent on primary key.
UNIT: 3
DATA STORAGE AND QUERY PROCESSING DATA STORAGE
AND QUERY PROCESSING DATA STORAGE AND QUERY
PROCESSING DATA STORAGE AND QUERY PROCESSING
1. Give the measures of quality of a disk.
Capacity
Access time
Seek time
Reliability
Primary storage
Secondary storage
Tertiary storage
4. Draw the storage device hierarchy according to their speed and
their cost.5.
10.
Parallelize large accesses so that the response time of large accesses isreduced
23. What are the factors to be taken into account when choosing a
RAID level?
o
Record types that allow variable lengths for one or more fields.
Used for storing records that has varying lengths for one or more fields.
An array whose entries contain the location and size of each record.
31. What are the two types of blocks in the fixed –length
representation? Definethem.
•
Overflow block: Contains the records other than those that are the firstrecord of a
chain.
Primary index
Secondary index
38. What are the types of indices?
Ordered indices
Hash indices
39. What are the techniques to be evaluated for both ordered
indexing and hashing?
Access types
Access time
Insertion time
Deletion time
Space overhead
40. What is known as a search key?
An attribute or set of attributes used to look up records in a file is called a
searchkey.
41. What is a primary index?
A primary index is an index whose search key also defines the sequential order
of the file.
42. What are called index-sequential files?
The files that are ordered sequentially with a primary index on the search key
arecalled index-sequential files.
43. What are the two types of indices?
Dense index
Sparse index
44. What are called multilevel indices?
Indices with two or more levels are called multilevel indices.
45. What are called secondary indices?
Indices whose search key specifies an order different from sequential order of
thefile are called secondary indices. The pointers in secondary index do not point
directly tothe file. Instead each points to a bucket that contains pointers to the file.
46. What are the disadvantages of index sequential files?
The main disadvantage of the index sequential file organization is
thatperformance degrades as the file grows. This degradation is remedied by
reorganizationof the file.
47. What is a B+-Tree index?
A B+-Tree index takes the form of a balanced tree in which every path from
theroot of the root of the root of the tree to a leaf of the tree is of the same length.
Draw the structure of a B+ tree and explain briefly.
A node contains up to n-1 search key values and n pointers.
P1 K1 P2 K2 …………. Pn-1 Kn-1 Pn
48. What is B-Tree?
A B-tree eliminates the redundant storage of search-key values .It allows
searchkey values to appear only once.
49. What is hashing?
Hashing allows us to find the address of a data item directly by computing a
hashfunction on the search key value of the desired record.
50. How do you create index in SQL?
We create index by he create index command.
Create index
<index name>
on
<relation name> (<attribute list>)
51. Distinguish between static hashing and dynamic hashing?Static
hashing
Static hashing uses a hash function in which the set of bucket adders isfixed. Such
hash functions cannot easily accommodate databases thatgrow larger over time.
Dynamic hashing
Dynamic hashing allows us to modify the hash function dynamically.Dynamic
hashing copes with changes in database size by splitting andcoalescing buckets as
the database grows and shrinks.
52. What is a hash index?
A hash index organizes the search keys, with their associated pointers, into a
hashfile structure.
53. What can be done to reduce the occurrences of bucket overflows
in a hash fileorganization?
optimization
evaluation
58. What is called an evaluation primitive?
A relational algebra operation annotated with instructions on how to evaluate
iscalled an evaluation primitive.
59. What is called a query evaluation plan?
A sequence of primitive operations that can be used to evaluate ba query is aquery
evaluation plan or a query execution plan.
60. What is called a query –execution engine?
The query execution engine takes a query evaluation plan, executes that plan,
andreturns the answers to the query.
|
Θ
s
r is the outer relation and s is the inner relation.
66. What is meant by block nested loop join?
Block nested loop join is the variant of the nested loop join where every block
of the inner relation is paired with every block of the outer relation. With in each
pair of blocks every tuple in one block is paired with every tuple in the other
blocks to generateall pairs of tuples.
67. What is meant by hash join?
In the hash join algorithm a hash function h is used to implement partition tuplesof
both relations.
68. What is called as recursive partitioning?
The system repeats the splitting of the input until each partition of the build
inputfits in the memory. Such partitioning is called recursive partitioning.
UNIT: 4
TRANSACTION PROCESSING TRANSACTION
PROCESSING TRANSACTION PROCESSING TRANSACTION
PROCESSING
1. What is transaction?
Collections of operations that form a single logical unit of work are
calledtransactions.
2. What are the two statements regarding transaction?
The two statements regarding transaction of the form:
Begin transaction
End transaction
3. What are the properties of transaction?
The properties of transactions are:
Atomicity
Consistency
Isolation
Durability
4. What is recovery management component?
Ensuring durability is the responsibility of a software component of the
basesystem called the recovery management component.
5. When is a transaction rolled back?
Any changes that the aborted transaction made to the database must be
undone.Once the changes caused by an aborted transaction have been undone,
then thetransaction has been rolled back.
6. What are the states of transaction?
The states of transaction are
Active
Partially committed
Failed
Aborted
Committed
Terminated
7. What is a shadow copy scheme?
It is simple, but efficient, scheme called the shadow copy schemes. It is based
onmaking copies of the database called shadow copies that one transaction is
active at atime. The scheme also assumes that the database is simply a file on disk.
8. Give the reasons for allowing concurrency?
The reasons for allowing concurrency is if the transactions run serially, a
shorttransaction may have to wait for a preceding long transaction to complete,
which can leadto unpredictable delays in running a transaction.So concurrent
execution reduces the unpredictable delays in running transactions.
9. What is average response time?
The average response time is that the average time for a transaction to
becompleted after it has been submitted.
10. What are the two types of serializability?
The two types of serializability is
Conflict serializability
View serializability
11. Define lock?
Lock is the most common used to implement the requirement is to allow
atransaction to access a data item only if it is currently holding a lock on that item.
12. What are the different modes of lock?
The modes of lock are:
Shared
Exclusive
13. Define deadlock?
Neither of the transaction can ever proceed with its normal execution.
Thissituation is called deadlock.
14. Define the phases of two phase locking protocol
Growing phase: a transaction may obtain locks but not release any lock.
Shrinking phase: a transaction may release locks but may not obtain any
newlocks.
15. Define upgrade and downgrade?
It provides a mechanism for conversion from shared lock to exclusive lock
isknown as upgrade.It provides a mechanism for conversion from exclusive lock
to shared lock isknown as downgrade.
16. What is a database graph?
The partial ordering implies that the set D may now be viewed as a
directedacyclic graph, called a database graph.
17. What are the two methods for dealing deadlock problem?
The two methods for dealing deadlock problem is deadlock detection
anddeadlock recovery.
18. What is a recovery scheme?
An integral part of a database system is a recovery scheme that can restore
thedatabase to the consistent state that existed before the failure.
19. What are the two types of errors?
The two types of errors are:
Logical error
System error
20. What are the storage types?
The storage types are:
Volatile storage
Nonvolatile storage
21. Define blocks?
The database system resides permanently on nonvolatile storage, and ispartitioned
into fixed-length storage units called blocks.
22. What is meant by Physical blocks?
The input and output operations are done in block units. The blocks residing onthe
disk are referred to as physical blocks.
Commit Overhead
•
Data fragmentation
Garbage collection
30.
Use the value of the system clock as the time stamp. That is a transaction’stime
stamp is equal to the value of the clock when the transaction enters thesystem.
•
Use a logical counter that is incremented after a new timestamp has beenassigned;
that is the time stamp is equal to the value of the counter.
34.
What are the time stamps associated with each data item?
•
W-timestamp (Q) denotes the largest time stamp if any transaction thatexecuted
WRITE (Q) successfully.
•
R-timestamp (Q) denotes the largest time stamp if any transaction thatexecuted
READ (Q) successfully.
UNIT: 5
CURRENT TRENDS CURRENT TRENDS CURRENT
TRENDS CURRENT TRENDS
1. What is meant by object-oriented data model?
The object-oriented paradigm is based on encapsulation of data and code relatedto
an object in to a single unit, whose contents are not visible to the outside world.
2. What is the major advantage of object-oriented programming
paradigm?
The ability to modify the definition of an object without affecting the rest of
thesystem is the major advantage of object-oriented programming paradigm.
3.
9. What is DAG?
The class-subclass relationship is represented by a directed acyclic
graph.eg:employees can be temporary or permanenet.we may create subclasses
temporaryand permanenet, of the class employee.
10. What is disadvantage of multiple inheritance?
There is potential ambiguity if the same variable or method can be inherited
frommore than one superclass.eg: student class may have a variable dept
identifying astudent's department, and the teacher class may correspondingly have
a variabledept identifying a teacher's department.
11. What is object identity?
An object retains its identity even if some or all the values of variables
ordefinitions of methods change overtime.
12. What are the several forms of identity?
*Value*Name*Built-in
13. What is a value?
A data value is used for identity. This form of identity is used in
relationalsystems.eg: The primary key value of a tuple identifies the tuple.
14. What is a Name?
A user-supplied name is used for identity. This form of identity is used for files
infile systems. The user gives each file a name that uniquely identifies it,
regardlessof its contents.
15What is a Built-in
A notation of identity is built-into the data model or programming language andno
user-supplied identifier is required. This form of identity is used in object-oriented
systems.
16 What is meant by object identifiers?
Object-oriented systems use an object identifier to identify objects.
Objectidentifiers are unique: that is each object has a single identifier, and no two
As the name suggests decision tree classifiers use a tree: each leaf node has an
associatedclass, and each internal node has a predicate associated with it.
16 Mark QuestionsUnit 1
1. Explain the architecture of DBMS with a neat block diagram
•
Storage manager
•
Query processor
•
Entity set
•
Mapping cardinalities
•
Relationship sets
•
Select operations
•
Project operations
•
Union operation
•
Set difference operations
•
Data requirements
•
Entity sets
•
Relationship sets
•
ER diagram
Unit II1.
Set membership
•
Set comparison
•
Explanation3.
Domain constraints
•
Referential integrity4.
Explanations
•
Security violations
•
Authorization
•
Privileges
•
Roles6. Explain the different normal forms in detail
•
1 normal form
•
2 nd normal form
•
3 rd normal form
•
4 th normal form
•
BCNF
UNIT III
1.
RAID LEVEL0
•
RAID LEVEL1
•
RAID LEVEL2
•
RAID LEVEL3
•
RAID LEVEL4
•
RAID LEVEL5
•
RAID LEVEL62.
Primary index
•
Multilevel index
•
Secondary index
•
Hash functions
•
Dynamic hashing4.
Structure
•
Queries
•
Updates5.
Optimization
•
Evaluation
Unit IV
1.
Consistency
•
Isolation
•
Durability2.
Explain serializability
•
Conflict serializability
•
View serializability3.
Shared
•
Exclusive4.
Deferred modification
UNIT V
1.
Structure
•
Document schema
•
Xml schema2.
Data replication
•
Fragmentation
•
Transparency3.
Explain Data mining in detail
•
Classification
•
Regression
•
Association4.
Components
•
Schema5.
Object structure
•
Object classes
•
Inheritance
•
Multiple inheritenceidentity