CS3492 DBMS Important 2 Mark With Answer
CS3492 DBMS Important 2 Mark With Answer
in/
UNIT: 1
.in
2. What is a data model? List the types of data model used. April/May-2011
A database model is the theoretical foundation of a database and fundamentally determines in
an
which manner data can be stored, organized, and manipulated in a database system. It thereby
defines the infrastructure offered by a particular database system. The most popular example of a
database model is the relational model.
Types of data model used
Hierarchical model
iya
Network model
Relational model
or
Entity-relationship
Object-relational model
p
Object model
w.
[Link]
[Link] [Link]
a) Data redundancy and inconsistency
b) Difficulty in accessing data
c) Data isolation
d) Integrity problems
e) Atomicity problems
f) Concurrent access anomalies
6. What are the advantages of using a DBMS?
The advantages of using a DBMS are
a) Controlling redundancy
b) Restricting unauthorized access
c) Providing multiple user interfaces
d) Enforcing integrity constraints.
e) Providing backup and recovery
.in
7. Give the levels of data abstraction?
a) Physical level
b) Logical level
an
c) View level
8. Define instance and schema?
iya
Instance: Collection of data stored in the data base at a particular moment is called an Instance
of the database.
Schema: The overall design of the data base is called the data base schema.
or
9. Define the terms
1) Physical schema
2) logical schema.
p
Physical schema: The physical schema describes the database design at the physical level,
w.
which is the lowest level of abstraction describing how the data are actually stored.
Logical schema: The logical schema describes the database design at the logical level, which
describes what data are stored in the database and what relationship exists among the data.
ww
[Link]
[Link] [Link]
.in
c) Storing, retrieving and updating data in the database
16. List the data structures implemented by the storage manager .
an
The storage manager implements the following data structure
a) Data files
b) Data dictionary
c) Indices iya
17. What is a data dictionary?
A data dictionary is a data structure which stores meta data about the structure of the database ie.
or
the schema of the database.
The entity relationship model is a collection of basic objects called entities and relationship
w.
among those objects. An entity is a thing or object in the real world that is distinguishable from
other objects.
ww
[Link]
[Link] [Link]
.in
In some cases a particular entity may not have an applicable value for an attribute or if we do not
know the value of an attribute for a particular entity. In these cases null value is used.
an
26. Define the terms i) Entity type ii) Entity set
Entity type: An entity type defines a collection of entities that have the same attributes.
Entity set: The set of all entities of the same type is termed as an entity set.
iya
27. What is meant by the degree of relationship set?
The degree of relationship type is the number of participating entity types.
28. Define the terms
or
i) Key attribute
ii) Value set
p
Key attribute : An entity type usually has an attribute whose values are distinct from each
individual entity in the collection. Such an attribute is called a key attribute.
w.
Value set: Each simple attribute of an entity type is associated with a value set that specifies the
set of values that may be assigned to that attribute for each individual entity.
ww
[Link]
[Link] [Link]
.in
functional dependencies are in :
a. R1∩ R2→ R1
b. R1∩ R2→ R 2
an
33. List the disadvantages of relational database system
Repetition of data
Inability to represent certain information.
34. What is first normal form?
iya
The domain of attribute must include only atomic (simple, indivisible) values.
or
35. What is meant by functional dependencies?
Consider a relation schema R and a C R and ß C R. The functional dependency a ß holds on
p
relational schema R if in any legal relation r(R), for all pairs of tuples t1 and t2 in r such that t1
w.
To test relations to see whether they are legal under a given set of functional dependencies.
To specify constraints on the set of legal relations.
[Link]
[Link] [Link]
UNIT:2
.in
organized by the appropriate data model
an
the database manipulation capabilities of SQL. Embedded SQL statements are SQL statements
written in line with the program source code of the host language. The embedded SQL
statements are parsed by an embedded SQL preprocessor and replaced by host-language calls to
iya
a code library. The output from the preprocessor is then compiled by the host compiler. This
allows programmers to embed SQL statements in programs written in any number of languages
such as: C/C++, COBOL and Fortran
or
3. Write short notes on relational model
The relational model uses a collection of tables to represent both data and the relationships
p
among those data. The relational model is an example of a record based model.
w.
[Link]
[Link] [Link]
.in
UNIT:3
1. What are the ACID properties? APRIL/MAY-2011
(atomicity, consistency, isolation, durability) is a set of properties that guarantee database
an
transactions are processed reliably. In the context of databases, a single logical operation on the
data is called a transaction. For example, a transfer of funds from one bank account to another,
even though that might involve multiple changes (such as debiting one account and crediting
iya
another), is a single transaction.
3. What is transaction?
Collections of operations that form a single logical unit of work are called transactions.
w.
[Link]
[Link] [Link]
.in
9. List out the statements associated with a database transaction?
Commit work
Rollback work
an
10. What is a shadow copy scheme?
It is simple, but efficient, scheme called the shadow copy schemes. It is based on making copies
iya
of the database called shadow copies that one transaction is active at a time. The scheme also
assumes that the database is simply a file on disk.
or
11. Give the reasons for allowing concurrency?
The reasons for allowing concurrency is if the transactions run serially, a short transaction may
have to wait for a preceding long transaction to complete, which can lead to unpredictable delays
p
transactions.
The average response time is that the average time for a transaction to be completed after it has
been submitted.
[Link]
[Link] [Link]
2. Exclusive
16. Define deadlock?
Neither of the transaction can ever proceed with its normal execution. This situation is called
deadlock.
.in
19. What is a database graph?
The partial ordering implies that the set D may now be viewed as a directed acyclic graph, called
a database graph.
an
20. What are the two methods for dealing deadlock problem?
The two methods for dealing deadlock problem is deadlock detection and deadlock recovery.
System error
23. What are the storage types?
ww
[Link]
[Link] [Link]
.in
30. Define shadow paging.
An alternative to log-based crash recovery technique is shadow paging. This technique needs
fewer disk accesses than do the log-based methods.
an
31. Define page.
The database is partitioned into some number of fixed-length blocks, which are referred to as
pages.
iya
32. Explain current page table and shadow page table.
or
The key idea behind the shadow paging technique is to maintain two page tables during the life
of the transaction: the current page table and the shadow p age table. Both the page tables are
identical when the transaction starts. The current page table may b e changed when a transaction
p
Data fragmentation
Garbage collection
35. Differentiate strict two phase locking protocol and rigorous two phase locking
protocol.
In strict two phase locking protocol all exclusive mode locks taken by a transaction is held
until that transaction commits.
Rigorous two phase locking protocol requires that all locks be held until the transaction
commits.
[Link]
[Link] [Link]
37. What are the time stamps associated with each data item?
• W-timestamp (Q) denotes the largest time stamp if any transaction that executed WRITE (Q)
successfully.
• R-timestamp (Q) denotes the largest time stamp if any transaction that executed READ (Q)
successfully.
UNIT:4
1. What are the advantages and disadvantages of indexed sequential file? APRIL/MAY-
.in
2011
The advantage of ordering records in a sequential file according to a key is that you can then
search the file more quickly. If you know the key value that you want, you can use one of the
an
relatively fast searches. The disadvantage is that when you insert, you need to rewrite at least
everything after the insertion point, which makes inserts very expensive unless they are done at
the end of the file. An indexed file approach keeps a (hopefully) small part of each row, and
iya
some kind of "pointer" to the row's location within the data file. This allows a search to use the
index, which is ordered by the index and (again hopefully) much smaller and therefore much
faster than scanning the entire data file for the indexed data.
or
2. What is database tuning? APRIL/MAY-2011
Database tuning describes a group of activities used to optimize and homogenize the
p
performance of a database. It usually overlaps with query tuning, but refers to design of the
w.
database files, selection of the database management system (DBMS), operating system and
CPU the DBMS runs on.
ww
[Link]
[Link] [Link]
.in
8. Define average latency time.
The average latency time of the disk is one-half the time for a full rotation of the disk.
an
9. What is meant by data-transfer rate?
The data-transfer rate is the rate at which data can be retrieved from or stored to the disk.
A block is a contiguous sequence of sectors from a single track of one platter. Each request
specifies the address on
w.
.in
laptop. Such devices are often limited in resources such as memory, computing power and
battery power.
an
UNIT:5
Inference control
w.
Flow control
Data encryption
ww
Sorting
Selection
.in
5 Displays page through top k results. Generates full answer.
an
Data cleaning
Data transformation
Data integration
Data loading & iya
Periodic data refreshing
.in
Prediction
Identification
Classification
an
Optimization
An association rule is of the form X→Y, where X={x1, x2 ,……. xn} and Y={y1, y2 ,……. yn} are
set of items with xi and yi being distinct items of all i and j. It must satisfy a minimum support
and confidence.
ww
.in
Finance
Resource optimization
Image Analysis
an
Fraud detection
iya
p or
w.
ww
[Link]