0% found this document useful (0 votes)
30 views

Adba Pyq

The document outlines various database topics including allocation strategies, data mining, query optimization, ETL processes, database security, data integrity, semantic databases, distributed versus centralized databases, cursors, stored procedures, triggers, join dependencies, database tuning, fragmentation, hash joins, data warehousing, data marts, checkpoints, normalization, concurrency control, and database administration tasks like parameter files, tablespaces, indexing, permissions, backups, troubleshooting, partitioning, privileges, instance management, concurrency, security, authentication, undo management, flashback, data loading, and recovery. Performance can be optimized by tuning SQL queries based on criteria.

Uploaded by

when.urja.writes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Adba Pyq

The document outlines various database topics including allocation strategies, data mining, query optimization, ETL processes, database security, data integrity, semantic databases, distributed versus centralized databases, cursors, stored procedures, triggers, join dependencies, database tuning, fragmentation, hash joins, data warehousing, data marts, checkpoints, normalization, concurrency control, and database administration tasks like parameter files, tablespaces, indexing, permissions, backups, troubleshooting, partitioning, privileges, instance management, concurrency, security, authentication, undo management, flashback, data loading, and recovery. Performance can be optimized by tuning SQL queries based on criteria.

Uploaded by

when.urja.writes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

YEAR-2023

- Allocation Strategies
- Mobile databases
- Data mining
- Role of query optimizer
- Process of ETL for data warehouse
- How oracle manages database security
- Assertions with example
- How to protect database from statistical query attacks
- Features of semantics database
- What are the challenges designing multimedia databases
- Characteristics of database approach
- Database vs traditional file system
- Data integrity
- Types of integrity constraints
- Semantic databases
- Process of searching knowledge in semantic databases
- Distributed DBMS vs centralized DBMS environment
- Cursors (SQL syntax, utility aspect)
- Stored procedures (SQL syntax, utility aspect)
- Triggers (SQL syntax, utility aspect)
- Join-Dependency with example, with which normal form is it associated
- Tuning a database, goals of tuning in RDMS, why query tuning is required
(2017- performance tuning, requirement and methodology)
- Data fragmentation in DBMS with example
- Algo and cost calculation for simple Hash Join
- Vendor-specific security
- Multilevel security
- Data warehouse, process of ETL for data warehouse
- Data marts, method of creating data mart
- How is checkpointing information used in recovery operation following a
system crash in DBMS
- Advantages of normalized relations over un-normalized relations
- Time stamp-based protocol, multi version scheme
- Serializability
- Recoverability
- Data Pump (2018)
YEAR-2018
- How much space needs to be allocated to undo tablespace
- Types of DB parameter file
- Temporary and default tablespaces
- How can you create index organised table
- How can you unlock a user account
- DBCA
- TDE
- Primary, secondary, public, context sensitive permission
- Role of data file while taking backup
- Troubleshooting
- OS environment variable which needs to be set at the time of DB installation
- Session and process parameters
- DB partitioning and its use
- Common system privileges in oracle
- Steps to manage DB instances
- Steps to manage data and concurrency
- Implementation of DB security w.r.t TDE process
- D/B authorization and authentication
- Steps in detail while managing Undo Data
- Undo tablespace
- Undo retention
- How can we view undo information
- Flashback DB architecture
- Steps in configuring flashback
- Steps to load data with SQL* Loader
- Steps in configuring recovery manager
- “Performance of a DB can be optimized by tuning SQL queries based on some
criteria”-do you agree with this statement. Justify (2017)

YEAR-2017
- Database packages (compare various)
- Role and responsibilities of DBA in DBMS
- Why and how is DB compression implemented in DB servers, discuss various
pros and cons
- Client server model and its component
- Communication protocols
- Types of failures
- Steps to restore DB in case of failure
- Three schema architecture
- Logical and physical data independence
- Goals of DB security
- Granting revoking privileges using SQL syntax and example
- SQL Server Agent Services, how it helps in automating various administrative
task, explain its various properties
- Stored procedures
- How to accept arguments in stored procedures
- How do we modify existing stored procedures
- Referential integrity
- D/B primary and foreign key
- DB backup and recovery strategies
- Privilege management
- How do we grant and revoke privileges
- Process of monitoring and optimizing performance of DB, how indexes can be
used to improve performance
- DB security
- How can DB be made secure
- DB security vs DB integrity

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy