Database Management System - B.Tech 5th Semester Exam., 2020
Database Management System
Instructions:
- The marks are indicated in the right-hand margin.
- There are NINE questions in this paper.
- Attempt FIVE questions in all.
- Question No. 1 is compulsory.
-
The way a particular application views the data from the database that the application uses is a
-
A relational database developer refers to a record as
-
Key to represent relationship between tables is called
-
It is better to use files than a DBMS when there are
-
Which of the following are the five built-in functions provided by SQL?
-
A B-tree of order 4 and of height 3 will have a maximum of keys.
-
Consider the following action: TRANSACTION..... Commit; ROLLBACK; What does rollback do?
-
Which of the following is used to get back all the transactions back after rollback?
-
_____ is an attack which forces an end user to execute unwanted actions on a Web application in which he/she is currently authenticated.
-
_____ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.
-
What are the five main functions of a database administrator?
-
What are four main differences between file-processing system and a DBMS?
-
Construct an E-R diagram for a university registrar's office. The office maintains data about each class, including the instructor, the enrollment, and the time and place of the class meetings. For each class pair, a grade is recorded. Document all assumptions that you make about the mapping constraints.
-
What is the use of relational query language in DBMS? Use the example to explain tuple and domain relational calculus.
-
Explain the following operations with the help of examples: (i) Generalized projection (ii) Outer join (iii) Aggregate function
-
Construct the B+ tree for the following set of key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31). Assume that tree is initially empty and values are added in ascending order. Construct B+ tree for the cases where the number of pointers that will fit in one node is as follows: (a) Four (b) Six (c) Eight
-
List the ACID properties. Explain the usefulness of each.
-
What benefit is provided by rigorous two-phase locking? How does it compare with other forms of two-phase locking?
-
What is the purpose of having separate categories for index authorization and resource authorization?
-
Explain the data mining and data warehousing related to DBMS.
-
Compute the closure (F+) of the following set of functional dependencies for the relational schema (A, B, C, D, E) = R. List the candidate keys for R:
\( A \rightarrow BC \)
\( CD \rightarrow E \)
\( B \rightarrow D \)
\( E \rightarrow A \)