0% found this document useful (0 votes)
53 views2 pages

18CS53

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views2 pages

18CS53

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

PiS

T
S T I T D

OF TECH
CBGS SCHENE LiBRARY
USN 18CS53

Fifth Semester B.E. Degree Examination, July/August2022


Database Management System
Timc: 3 hrs. Max. Marks: 100

Note: Answer any FIVE full questions, choosing ONE full question from each module.

Module-1
1 a. Discuss the advantages of using the DBMS approach. (06 Marks)
b. Explain three-schema architecture with a ncat diagram. Why do we nced mapping between
schema levels? (06 Marks)
c. Explain the component modules of DBMS and their interaction with the help of a diagram.
(08 Marks)

OR
2 a. Define the following terms:
i) Weak entity (ii) DBMS catalog (ii) Snapshot
(iv) Value sets (v) Cardinality ratio (vi) Degree of a relationship (06 Marks)
b. Explain the different categories of data models. (06 Marks)
C. Write the ER diagram for an employee database. The constraints are as follows:
(1) An employee works for a department
(i) Every department is headed by a manager
(ii) An employee works on one or more projects
(iv) An employee has dependents
(v) A department controls the projects (08 Marks)

Module-2
3 a. What is meant by Integrity Constriant? Explain the importance of referential integrity
constraint. How referential integrity constraint is implemented in SQL. (08 Marks)
b. Write the relational algebra operations to perform the following queries:
() Retrieve the name and address of all employees who work for the "Accounts"
department.
(i) Retrieve the names of employers who have no dependents.
(ii) Find the names of employees who work on all the projects controlled by department
number 2. (06 Marks)
c.Explain the relational algebra operationsfrom Set theory, with examples. (06 Marks)

OR
4 a. Explain the ER to relational mapping algorithm with suitable example for each step.
(10 Marks)
b. Write the SQL queries for the following database schema:
Student (USN, NAME, BRANCH, PERCENTAGE)
Faculty (FID, FNAME, DEPARTMENT, DESIGNATION, SALARY)
Course (CID, CNAME, FID)
Enroll (CID, USN, GRADE)
() Retrieve the names of all students enrolled for the course CS54
(i) List all the departments having an average salary of the faculties above Rs.10,000.
(11) List the names of the students enrolled for the course'CS_51 and having 'B grade.
(06 Marks)
C. Explain with examples in SQL: (i) INSERT command (i) UPDATE command (04 Marks)
1 of 2
BRARY 18CS53

Module-3
lo areassertions and triggecrs defined in SQI? Explain with examples (O8 Marks)
p l a i n stored pwcedures in SQI withan example 06 Marks)
t list out and explain the different types of JDBC drivers (06 Marks)

OR
6 . What is a three-tier arehitecture? Whal advantages it offer over single tier and two tier
arehiteetures? Give a shot overvicw of the functionality at each of the three-tier. (10 Mark)
H o n to ereate v iews in SQI? Explain with an cxample. (06 Marks)
What is SQLI How it is diflerent from JDBC? (04 Marks)

Module-4
a. Explain an informal design guidelines for relational schema design (08 Marks)
b.What is the need for normalization? Explain INF, 2NF and 3NF with examples. (08 Marks)
.What do you understand by attribute closure? Give an example. (04 Marks)

OR
8 a. What is functional dependency? Explain the inference rules for functional dependency with
proof. (08 Marks)
b. Define 4NF. When it is violated? Why is it useful? (06 Marks)
.Consider two sets of functional dependency F = {A > C, AC > D, E > AD, E > H} and

G ACD, E -> AH}. Are theyequivalent? (06 Marks)

Module-5
9 a. Why concurrency control is needed? Demonstrate with an example (10 Marks)
b. Discuss the UNDO and REDO« perations and the recovery techniques that use each.
(06 Marks)
C. Explain the ACID properties of a database transäction. (04 Marks)

OR
10 a. Discuss Two-Phase Locking Technique for concurrency control. (10 Marks)
b. When deadlock and starvation problem occur? Explain how these problems can be resolved
(10 Marks)

* * * **

2 of 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy