0% found this document useful (0 votes)
7 views2 pages

Imp Q

The document outlines key concepts in database management, covering relational data models, distributed databases, XML databases, NoSQL systems, and database security. It includes topics such as ER models, SQL queries, normalization, distributed transactions, XML schemas, the CAP theorem, and security measures like access control and encryption. Each unit provides essential definitions, explanations, and examples relevant to database design and management.

Uploaded by

13 JAYALAKSHMI K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views2 pages

Imp Q

The document outlines key concepts in database management, covering relational data models, distributed databases, XML databases, NoSQL systems, and database security. It includes topics such as ER models, SQL queries, normalization, distributed transactions, XML schemas, the CAP theorem, and security measures like access control and encryption. Each unit provides essential definitions, explanations, and examples relevant to database design and management.

Uploaded by

13 JAYALAKSHMI K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

UNIT I: Relational Data Model

1. What are the key components of the Entity-Relationship (ER) model?

2. Explain how to map an ER model to a relational model.

3. What is relational algebra? Discuss its key operations.

4. Write SQL queries to perform the following:

o Create, alter, and drop a table.

o Enforce primary key, foreign key, check, unique, and not null constraints.

o Use aggregate functions like COUNT, AVG, and SUM.

5. Describe the normalization process and its significance in database design.

6. Explain the differences between inner join, left outer join, right outer join, and full
outer join.

UNIT II: Distributed Databases, Active Databases, and Open Database Connectivity

1. What is distributed database architecture? Discuss its advantages and


challenges.

2. Explain distributed data storage and its significance.

3. What are distributed transactions, and how are they managed?

4. Describe the Event-Condition-Action (ECA) model in active databases.

5. What are the design and implementation challenges of active databases?

6. Discuss the role of Open Database Connectivity (ODBC) in database systems.

UNIT III: XML Databases

1. What is the difference between structured, semi-structured, and unstructured


data?

2. Explain the XML hierarchical data model with examples.

3. What is a Document Type Definition (DTD) in XML? How is it used?

4. Discuss the purpose and applications of XPath and XQuery.

5. How are XML schemas used in XML documents and databases?


UNIT IV: NoSQL Databases and Big Data Storage Systems

1. Compare the categories of NoSQL systems and provide examples.

2. Explain the CAP theorem and its implications in distributed systems.

3. What are the key features of MongoDB’s data model and distributed system
characteristics?

4. Describe the DynamoDB and Voldemort key-value data store.

5. Explain HBase CRUD operations and its storage architecture.

6. What are graph databases? Discuss the features of Neo4j and its Cypher query
language.

7. Define big data. How do MapReduce and Hadoop facilitate big data processing?

8. What is YARN, and how does it function within the Hadoop ecosystem?

UNIT V: Database Security

1. What are the major database security issues faced by organizations?

2. Explain discretionary access control and its implementation using SQL.

3. Discuss mandatory access control and role-based access control for multilevel
security.

4. What is SQL injection? How can it be prevented?

5. Explain the concept of encryption and public key infrastructure in database


security.

6. Discuss the challenges of preserving data privacy in database systems.

7. What is database survivability, and how does Oracle implement label-based


security?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy