Anna University Questions with Answers - CS8303 Database Management Systems April May 2019, Computer Science and Engineering, Third semester, Regulation 2012
Exam |
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS |
Academic Year |
April May 2019 |
Subject Code |
CS8303 |
Subject Name |
Database Management Systems |
Branch |
Computer Science and Engineering |
Semester |
Third Semester |
Regulation |
2012 |
B.E / B.Tech. DEGREE END SEMESTER EXAMINATIONS, Apr/May 2019
Computer Science and Engineering
Third Semester
CS8303 – DATABASE MANAGEMENT SYSTEMS
(Regulations 2012)
Time : 3 Hours Answer A L L Questions Max. Marks 100
PART-A (10 x 2 = 20 Marks)
1. Is data management necessary? State the needs identified.
2. Give the representations of data.
3. Where do we use BCNF? Why?
Answer:
We use BCNF when there are more than one candidate keys in a table and they are overlapping. These overlapping candidate keys lead to anomalies even though the underlying relation is in 3NF.
BCNF is a stronger version of 3NF because it restricts both prime and non-prime attributes, while 3NF only restricts non-prime attributes.
4. Define Normalisation. Give it’s benefits.
Answer:
Normalization is the formal process of decomposing relations with anomalies to produce smaller, well-structured and stable relations. Primarily, it is a tool to validate and improve a logical design so that it satisfies certain constraints that avoid unnecessary duplication of data.
5. Which join is popularly used? Why?
Answer:
Natural join.
6. What is an embedded SQL? Give example.
Answer:
Embedded SQL involves the placement of SQL language constructs in procedural language code. That is, inserting specially marked SQL statements into program source texts written in other programming languages including C, PL/SQL etc.
Example: Insert a row into table RESULTS from C language.
EXEC SQL INSERT INTO RESULTS(SID, CAT, ENO, POINTS)VALUES (:sid, :cat, :eno, :points);
7. State the ACID properties.
Answer:
Atomicity, Consistency, Isolation and Durability
8. What are locking protocols? How are they useful?
Answer:
Locking protocols are useful mechanisms to handle concurrent transactions that are working (modifying) on same data items.
9. Compare and contrast indexing and hashing.
10. How do we visualize multidimensional data?
Part B— (5 * 16 =80 marks)
11. i. What are data models? Explain with neat diagram. (8)
ii. With a neat sketch elaborate database architecture and its working. (8)
12. a. Design an ER model for course registration system. Mention the constraints considered by you and explain the steps involved in arriving at the model. (16)
(OR)
b. State the steps followed for ER to Relational mapping. Perform and arrive at relational model for course registration system. (16)
13. a. Write a trigger to update count as students register for sports event. Explain the trigger in detail. (16)
(OR)
b. What are cursors? Write a cursor to identify the number of students who have obtained O grade in Mathematics. Explain in detail. (16)
14. a. State and explain the workingof two phase commit protocol with a neat diagram. (16)
(OR)
b. Define concurrency. What is the need for concurrency? Explain the techniques used and the SQL support for concurrency. (16)
15. a. Explain query processing and optimization in detail with relevant examples. (16)
(OR)
b. i. Discuss in detail, Spatial and Temporal databases and its applications. (10)
ii. Write short notes on the use of mobile databases. (6)
************************
No comments:
Post a Comment