Name of the Institute : Babu Banarasi Das National Institute of Technology & Management
Degree : MCA
Department : Computer Applications
Subject Code/Name : (MCA-313) Database Management System
Year : 2nd
Semester : 3rd
Document Type : Question Bank
Website : bbdnitm.ac.in
Download Model/Sample Question Paper :https://www.pdfquestion.in/uploads/bbdnitm.ac.in/3152-MCA313-Database-Management-System-QUESTION-BANK.pdf
BBDNITM DBMS Question Bank
Unit I
1. Define the concept of “database schema.” Describe the types of schemas that exist in a database complying with the three levels ANSI/SPARC architecture.
Related / Similar Question Paper : BBDNITM MCA Design & Analysis of Algorithm Question Bank
2. List four significant differences between a file-processing system and a DBMS.
3. List five responsibilities of a database management system. For each responsibility, explain the problems that would arise if the responsibility were not discharged.
4. What do understand by the term ’data model’? Explain the difference between a data model and its implementation. Why is the difference important?
5. What three main types of actions involve databases? Briefly discuss each.
6. What is the difference between logical data independence and physical data independence?
7. What is the difference between procedural and nonprocedural DMLs?
8. Discuss the different types of user-friendly interfaces and the types of users who typically use each.
9. Discuss some types of database utilities and tools and their functions.
10. Distinguish between strong and weak entity?
11. Should a real world object be modelled as an entity or as an attribute?
12. Construct an E-R diagram for a car-insurance company whose customers own one or more cars each. Each car has associated with it zero to any number of recorded accidents.
13. Construct an E-R diagram for a hospital with a set of patients and a set of medical doctors. Associate with each patient a log of the various tests and examinations conducted.
14. We can convert any weak entity set to a strong entity set by simply adding appropriate attributes. Why, then, do we have weak entity sets?
Unit II
1. Describe the differences in meaning between the terms relation and relation schema. Illustrate your answer by an example.
2. Discuss the characteristics of relations that make them different from ordinary tables and files.
3. Why are duplicate tuples not allowed in a relation?
4. Why are tuples in a relation not ordered?
5. What is the difference between a key and a superkey?
6. Discuss the various reasons that lead to the occurrence of null values in relations.
7. Define foreign key. What is this concept used for? How does it play a role in the join operation?
8. Does the relational model, as seen by an SQL query writer, provide physical and logical data independence? Explain.
9. What is the difference between a candidate key and the primary key for a given relation? What is a superkey?
10. Answer each of the following questions briefly. The questions are based on the following relational schema :
Emp(eid : integer, ename: string, age: integer, salary: real)
Works(eid : integer, did: integer, pct time: integer)
Dept(did : integer, dname: string, budget: real, managerid: integer)
a. Give an example of a foreign key constraint that involves the Dept relation. What are the options for enforcing this constraint when a user attempts to delete a Dept tuple?
b. Write the SQL statements required to create the above relations, including appropriate versions of all primary and foreign key integrity constraints.
11. Given two relations R1 and R2, where R1 contains N1 tuples, R2 contains N2 tuples, and N2 > N1 > 0, give the minimum and maximum possible sizes (in tuples) for the result relation produced by each of the following relational algebra expressions. In each case, state any assumptions about the schemas for R1 and R2 that are needed to make the expression meaningful :
12. What is relational completeness? If a query language is relationally complete, can you write any desired query in that language?
13. What is an unsafe query? Give an example and explain why it is important to disallow such queries.
Unit III
1. Explain what is meant by repetition of information and inability to represent information. Explain why each of these properties may indicate a bad relational database design.
3. Use the definition of functional dependency to argue that each of Armstrong’s axioms (reflexivity, augmentation, and transitivity) is sound.
4. Give a set of FDs for the relation schema R(A,B,C,D) with primary key AB under which R is in 1NF but not in 2NF.
5. Give a set of FDs for the relation schema R(A,B,C,D) with primary key AB under which R is in 2NF but not in 3NF.
6. Consider the relation schema R(A,B,C), which has the FD B?C. If A is a candidate key for R, is it possible for R to be in BCNF? If so, under what conditions? If not, explain why not.
7. Suppose that we have a relation schema R(A,B,C) representing a relationship between two entity sets with keys A and B, respectively, and suppose that R has (among others) the FDs A?B and B?A. Explain what such a pair of dependencies means (i.e., what they imply about the relationship that the relation models).
9. Describe the purpose of normalizing the data? Describe the types of anomalies that may occur on a relation that has redundant data?
10. Give an example of a relation which is in 3NF but not in BCNF? How will you convert that relation to BCNF?
11. Given a relation R(S, B, C, D) with key={S, B, D} and F={S ? C}. Identify the normal form of the relation R?
12. List the three design goals for relational databases, and explain why each is desirable.
13. Give an example of a relation schema R and a set of dependencies such that R is in BCNF, but is not in 4NF.
14. Explain why 4NF is a normal form more desirable than BCNF.
15. Explain how dangling tuples may arise. Explain problems that they may cause.
Unit IV
1. List the ACID properties. Explain the usefulness of each.
2. Suppose that there is a database system that never fails. Is a recovery manager required for this system?
3. Database-system implementers have paid much more attention to the ACID properties than have file-system implementers. Why might this be the case?
4. Explain the distinction between the terms serial schedule and serializable schedule.
5. Since every conflict-serializable schedule is view serializable, why do we emphasize conflict serializability rather than view serializability?
6. Under what conditions is it less expensive to avoid deadlock than to allow deadlocks to occur and then to detect them?
7. If deadlock is avoided by deadlock avoidance schemes, is starvation still possible? Explain your answer.
8. What is meant by the concurrent execution of database transactions in a multiuser system? Discuss why concurrency control is needed, and give informal examples.
9. Discuss the different types of failures. What is meant by catastrophic failure?
10. What is the system log used for? What are the typical kinds of records in a system log? What are transaction commit points, and why are they important?
11. What is a schedule (history)? Define the concepts of recoverable, cascadeless, and strict schedules, and compare them in terms of their recoverability.
12. Discuss the different measures of transaction equivalence. What is the difference between conflict equivalence and view equivalence?
13. Discuss the different measures of transaction equivalence. What is the difference between conflict equivalence and view equivalence?
14. Discuss how serializability is used to enforce concurrency control in a database system. Why is serializability sometimes considered too restrictive as a measure of correctness for schedules?
Unit V
1. Explain how the following differ : fragmentation transparency, replication transparency, and location transparency.
2. When is it useful to have replication or fragmentation of data? Explain your answer.
3. Explain the notions of transparency and autonomy. Why are these notions desirable from a human-factors standpoint?
4. To build a highly available distributed system, you must know what kinds of failures can occur.
a. List possible types of failure in a distributed system.
b. Which items in your list from part a are also applicable to a centralized system?
5. Explain the difference between data replication in a distributed system and the maintenance of a remote backup site.
6. What is strict 2PL? Explain its role in Lock-Based Concurrency Control.
7. Show that the two-phase locking protocol ensures conflict serializability, and that transactions can be serialized according to their lock points.
View Comments (2)
A company plans to consume 9000 pieces of a particular component.
Past records indicate that purchasing department had used Rs. 12,000 for placing 500 orders. If the price of component is Rs. 12 and inventory carrying cost is 10% of cost. Find: i)The economic order quantity. ii ) Total cost of inventory.iii) The number of orders per year
Describe five different lock modes?