cb3401 Question Bank
cb3401 Question Bank
PART B
1 Discuss the various types of data models and their significance in database management KL2
systems.
2 Explain the principles of relational algebra with suitable examples. KL2
3 Write detailed notes on the syntax and semantics of SQL, including examples of queries. KL1
4 Discuss the key components of the Entity-Relationship Model and its importance in KL2
database design.
5 Explain the process of mapping ER models to relations with an example. KL2
6 Describe the architecture of distributed databases and the challenges involved in their KL2
management.
7 Elaborate on data fragmentation, its types, and the criteria used for data distribution in KL2
distributed databases.
8 Discuss the concepts of replication, its benefits, and the issues associated with maintaining KL2
consistency in replicated databases.
9 Explain the normalization process in relational databases with examples, and discuss the KL2
various normal forms.
10 Describe the different types of joins in relational algebra and their applications in database KL2
queries.
Unit II: Database Design
PART A
QUESTION KL
1 What is an ER Diagram? KL
1
2 Define functional dependency. KL
1
3 State non-loss decomposition. KL
1
4 What is the First Normal Form (1NF)? KL
1
5 Define the Second Normal Form (2NF). KL
1
6 What is the Third Normal Form (3NF)? KL
1
7 Define dependency preservation. KL
1
8 What is the Boyce-Codd Normal Form (BCNF)? KL
1
9 Define multi-valued dependency. KL
1
10 What is the Fourth Normal Form (4NF)? KL
1
11 Explain join dependency. KL
2
12 What is the Fifth Normal Form (5NF)? KL
1
13 Define candidate key. KL
1
14 State the concept of partial dependency. KL
1
15 What is transitive dependency? KL
1
16 Define super key. KL
1
17 Outline the significance of a primary key. KL
2
18 What is a foreign key? KL
1
19 Define normalization in databases. KL
1
20 State the term 'composite key'. KL
1
PART B
1 Discuss the steps involved in creating an ER Diagram and its significance in database KL
design. 2
2 Explain functional dependencies and their role in database normalization with examples. KL
2
3 Describe non-loss decomposition and its importance in maintaining data integrity. KL
2
4 Explain the First Normal Form (1NF) with examples, and discuss how it helps in KL
organizing data. 2
5 Describe the Second Normal Form (2NF) with examples, and explain how it eliminates KL
partial dependencies. 2
6 Discuss the Third Normal Form (3NF) with examples, and explain how it addresses KL
transitive dependencies. 2
7 Explain the concept of dependency preservation and its significance in database KL
normalization. 2
8 Describe the Boyce-Codd Normal Form (BCNF) with examples, and discuss how it KL
strengthens the normalization process. 2
9 Explain multi-valued dependencies and the conditions under which a table is in Fourth KL
Normal Form (4NF). 2
10 Discuss join dependencies and the criteria for a table to be in Fifth Normal Form (5NF). KL
2
Unit III: Transaction Management
PART A
QUESTION KL
1 Define a transaction in database management. KL
1
2 What are ACID properties? KL
1
3 State the concept of serializability. KL
1
4 What is transaction isolation? KL
1
5 Define concurrency control. KL
1
6 Why is concurrency needed in databases? KL
1
7 What are lock-based protocols? KL
1
8 Illustrate deadlock in the context of databases. KL
1
9 What is a recovery system in databases? KL
1
10 Classify different types of failures in database systems. KL
2
11 What is a recovery algorithm? KL
1
12 Define transaction scheduling. KL
1
13 What is a commit operation? KL
2
14 Illustrate the concept of rollback in transaction management. KL
2
15 What is a two-phase locking protocol? KL
1
16 Define deadlock prevention. KL
1
17 What is deadlock detection? KL
1
18 illustrate the concept of checkpointing in recovery systems. KL
2
19 What is the write-ahead logging (WAL) protocol? KL
2
20 Define transaction consistency. KL
1
PART B
1 Discuss the key concepts of transaction management and their importance in database KL
systems. 2
2 Explain the ACID properties in detail with examples of how they ensure reliable KL
transactions. 2
3 Describe the concept of serializability and its role in ensuring correct transaction execution. KL
2
4 Explain the various transaction isolation levels and their significance in maintaining KL
database consistency. 2
5 Discuss the need for concurrency control in databases and the challenges it addresses. KL
2
6 Describe lock-based protocols, their types, and how they help in managing concurrency. KL
2
7 Explain the problem of deadlock, its causes, and the strategies for deadlock handling in KL
databases. 2
8 Discuss the architecture and components of a recovery system in databases. KL
2
9 Explain failure classification in databases and the strategies used for recovery from different KL
types of failures. 2
10 Describe recovery algorithms, their working principles, and how they help in restoring KL
database consistency after a failure. 2
Unit IV: Database Security
PART A
QUESTION KL
1 Why is database security important? KL
1
2 Define SQL injection. KL
1
3 What is the injection technique in SQLi attacks? KL
1
4 Mention different types of SQL injection attacks. KL
2
5 What is an attack avenue in the context of SQLi? KL
1
6 Define the term 'vulnerability' in database security. KL
1
7 What is a parameterized query? KL
1
8 State the concept of input validation. KL
1
9 What is the purpose of database encryption? KL
1
10 Define 'privilege escalation' in database security. KL
1
11 What is a stored procedure? KL
1
12 Define the term 'sanitization' in the context of database security. KL
1
13 What is a 'honeypot' in cybersecurity? KL
1
14 Define 'cross-site scripting' (XSS). KL
1
15 What is the role of a firewall in database security? KL
1
16 What is an authentication mechanism? KL
1
17 Define 'access control'. KL
1
18 What is a database audit? KL
1
19 Outline the concept of 'role-based access control' (RBAC). KL
2
20 What is 'data masking'? KL
1
PART B
1 Discuss the need for database security and the potential consequences of a security breach. KL
2
2 Explain SQL injection attacks, their methods, and the impact they can have on a database KL
system. 2
3 Describe the injection technique used in SQLi attacks with examples. KL
2
4 Discuss the various types of SQL injection attacks and their respective characteristics. KL
2
5 Explain SQLi attack avenues and how attackers exploit them to gain unauthorized access. KL
2
6 Discuss different methods and best practices to prevent SQL injection attacks. KL
2
7 Explain the concept of input validation and its importance in securing databases from SQLi KL
attacks. 2
8 Discuss the role of encryption in database security and the techniques used to encrypt data. KL
2
9 Describe the process of privilege escalation and the measures to prevent it in database KL
systems. 2
10 Explain the concept of role-based access control (RBAC) and how it enhances database KL
security. 2
Unit V: Access Control and Encryption
PART A
QUESTION KL
1 What is database access control? KL
1
2 Define SQL-based access definition. KL
1
3 What are cascading authorizations? KL
1
4 State role-based access control. KL
1
5 Define inference in the context of database security. KL
1
6 What is database encryption? KL
1
7 What is an access control list (ACL)? KL
1
8 Define the term 'access control policy'. KL
1
9 What is the principle of least privilege? KL
1
10 Illustrate the concept of discretionary access control (DAC). KL
2
11 What is mandatory access control (MAC)? KL
1
12 Define the term 'encryption key'. KL
1
13 What is symmetric encryption? KL
1
14 What is asymmetric encryption? KL
1
15 Define public key infrastructure (PKI). KL
1
16 State the term 'data masking'. KL
1
17 What is the role of a database administrator (DBA) in access control? KL
1
18 What is two-factor authentication? KL
1
19 Outline the concept of data integrity. KL
2
20 What is a digital signature? KL
1
PART B
1 Discuss the various database access control mechanisms and their importance in securing KL
databases. 2
2 Explain SQL-based access definition, its implementation, and its role in database security. KL
2
3 Describe cascading authorizations, how they work, and their impact on database security. KL
2
4 Discuss role-based access control (RBAC), its principles, and how it enhances database KL
security. 2
5 Explain the concept of inference and the techniques used to prevent inference attacks in KL
databases. 2
6 Discuss the importance of database encryption and the different encryption techniques used KL
to protect data. 2
7 Explain the principle of least privilege and its significance in access control policies. KL
2
8 Describe the difference between discretionary access control (DAC) and mandatory access KL
control (MAC), and their applications in database security. 2
9 Explain the role of encryption keys in database encryption and the management of these KL
keys. 2
10 Discuss the role of a database administrator (DBA) in implementing and maintaining KL
access control measures in a database system. 2