0% found this document useful (0 votes)
8 views

Be Computer Engineering Semester 5 2023 November Database Management Systems Dms Pattern 2019

Uploaded by

shadowflash0508
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Be Computer Engineering Semester 5 2023 November Database Management Systems Dms Pattern 2019

Uploaded by

shadowflash0508
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 8] SEAT No.

8
23
P-7537 [Total No. of Pages : 2

ic-
[6180]-45

tat
3s
T.E. (Computer Engg./Artificial Intelligence & Data Science)

4:5
02 91
DATABASE MANAGEMENT SYSTEM

9:4
0
(2019 Pattern) (Semester - I) (310241)

30
9/1 13
0
Time : 2½ Hours] [Max. Marks : 70
1/2
.23 GP

Instructions to the candidates:


1) Answer Q. 1 or Q. 2, Q. 3 orQ. 4, Q. 5or Q. 6, Q.7 or Q.8.
E
82

8
C

23
2) Neat diagrams must be drawn wherever necessary.

ic-
3) Figures to the right indicate full marks.
16

tat
4) Assume suitable data, if necessary.
8.2

3s
.24

4:5
91
49

Q1) a) What is anomaly in relational model. Explain how normalization can


9:4
30

be used to reduce the anomalies. [9]


30
01
02

b) Explain 2NF and 3NF and BCNF with example. [9]


1/2
GP

OR
9/1
CE
82

Q2) a) What are relational integrity constraints. Explain with example Domain

8
23
constraints, Referential-Integrity and enterprise constraints. [9]
.23

ic-
16

tat
b) Elaborate the significance of codd’s rule. Explain 12 rules proposed
8.2

3s

by codd’s. [9]
.24

4:5
91
49

9:4
30

Q3) a) Explain the concept of conflict serializability with suitable example.


30

Since every conflict-serializable schedule is view serializable, why do


01
02

we emphasize conflict serializability rather than view serializability?


1/2
GP

[9]
9/1
CE

b) Explain the two-phase lock protocol for concurrency control. Also


82

explain its two versions: strict two-phase lock protocol and rigorous
.23

two-phase lock protocol. [8]


16
8.2

OR
.24
49

P.T.O.
Q4) a) What is R-timestamp(Q) and W-timestamp(Q) Explain the necessary

8
condition used by time stamp ordering protocol to execute for a read /

23
write operation. [8]

ic-
tat
b) To ensure atomicity despite failures we use Recovery Methods Explain

3s
in detail following Log-Based Recovery methods with example. [9]

4:5
02 91
i) Deferred Database Modifications

9:4
ii) Immediate Database Modifications

0
30
9/1 13
0
1/2
Q5) a) Compare SQL and NOSQL Database. [6]
.23 GP

b) Explain BASE Properties of NOSQL Database. [6]


E
82

8
C

c) Explain Document Based and Key value data model of NOSQL

23
Database. [6]

ic-
16

tat
OR
8.2

3s
Q6) a) Explain the CRUD operations used in MongoDB with example. [6]
.24

4:5
91
49

b) State and Explain CAP Theorem. [6]


9:4
30
30

c) Explain Map Reduce with example. [6]


01
02
1/2
GP

Q7) a) What are spatial data. Explain Geographic and Geometric data. [8]
9/1

b) What is the significance of XML databases? Explain with proper


CE
82

8
23
example when to use XML database. [9]
.23

OR ic-
16

tat
8.2

Q8) a) Write a short note on complex data types : [8]


3s
.24

4:5

i) Semi-structured data
91
49

9:4

ii) Features of semi-structured data models


30
30

b) What is object relational database system. Explain Table inheritance


01
02

with example. [9]


1/2
GP
9/1


CE
82
.23
16
8.2
.24
49

[6180]-45 2

You might also like