Вы находитесь на странице: 1из 3

Questions Chapter No.

Explain pull-only, push-only and hybrid Data Delivery Modes. 1


Define Distributed Database System. What is transparency in DDBMS? Explain Layers of transparency in DDBMS. 1
Explain the following terms: (i) Fragmentation transparency (ii) Replication transparency 1
Define Distributed Database System. What is transparency in DDBMS? Explain Layers of transparency in DDBMS. 1
Define Distributed Database System. What is transparency in DDBMS? Explain Layers of transparency in DDBMS. 1
Explain the different Transparencies in DDBMS. 1
Explain Components of Distributed DBMS. 1
Define Normalization. How anomalies can be eliminated with Normalization ? 2
Describe functional layers of Relational DBMS. 2
Describe functional layers of Relational DBMS. 2
Explain FD and MVD in RDBMS with example. 2
Explain Client/Server Database architecture. 3
Elaborate Peer to Peer Distributed architecture. 3
Elaborate Peer to Peer Distributed architecture. 3
Explain Client Server architecture for Distributed DBMS. 3
Explain Horizontal Fragmentation. 4
Compare Global versus Local Data Dictionaries. 4
Explain Top Down Design Process for Distributed Database. 4
Describe Bond Energy Algorithm (BEA) algorithm in vertical fragmentation. 4
What is allocation? List and explain the information requirements during allocation. 4
Describe Bond Energy Algorithm (BEA) algorithm in vertical fragmentation. 4
What is allocation? List and explain the information requirements during allocation. 4
Explain Derived horizontal fragmentation with Example. 4
How to test correctness of Fragmentation? 4
Explain View management. How it is carried out in centralized and distributed DBMS? 5
Explain Discretionary Access Control. 5
What do you mean by distributed semantic integrity control? Explain with example. 5
What is authorization control? How to imply authorization control in centralized and distributed environment. 5
What do you mean by distributed semantic integrity control? Explain with example. 5
What is authorization control? How to imply authorization control in centralized and distributed environment. 5
Explain Views in DDBMS. 5
How to prevent unauthorized remote access in distributed authorization control. 5
Explain Characterization of Query Processors 6
Explain Layers of Query Processing 6
Draw and explain query processing in centralized system. 6
Write a short note on: Phases of Distributed Query Processing 6
Draw and explain query processing in centralized system. 6
Write a short note on: Phases of Distributed Query Processing 6
Explain Objectives of Query Processing. 6
Explain Layers of distributed Query Processing. 6
Discuss Join versus Semi Join for Query optimization. 7
Explain Cost Function of Query Optimization. 7
Discuss query optimization in brief. 7
Discuss join ordering in query optimization. 7
Discuss query optimization in brief. 7
Discuss join ordering in query optimization. 7
Explain search space generation in Query Optimization. 7
Explain search strategy in Query Optimization. 7
List distributed Query optimization algorithms. Write two 7
Explain ACID Property of Transaction. 8
Explain Centralized 2PL for distributed DBMS environment. 8
Explain Multiple Granularities. 8
Explain Type of Transactions. 8
Explain Conservative Timestamp Ordering Algorithm 8
Explain Deadlock Avoidance Techniques. 8
Explain terms: Cascading Abort, Dirty Read, Fuzzy Read, and Conflict Equivalence. 8
Explain Three Phase commit protocols. 8
Define a transaction. Discuss the ACID properties of a transaction. 8
Compare locking-based and timestamp-based concurrency control protocols with the help of examples. 8
Explain Two Phase Commit Protocol (2PC). 8
Define a transaction. Discuss the ACID properties of a transaction. 8
Compare locking-based and timestamp-based concurrency control protocols with the help of examples. 8
Explain Two Phase Commit Protocol (2PC). 8
Explain a Model of Transaction. 8
Explain conflict serializability by giving example. 8
Explain ACID properties of Transaction in detail. 8
Explain terms: Cascading Abort, Dirty Read, Fuzzy Read, Conflict Equivalence. 8
Describe 2PL protocol. Explain centralized 2PL protocol and Distributed 2PL protocol. 8
Explain Two Phase Commit Protocol. 8
Explain Fuzzy Check Points. 9
Define Reliability and Availability 9
Explain Communication Failures in Distributed DBMS. 9
Explain different types of failures in DDBMS. 9
Discuss wait - die and wound – wait deadlock avoidance algorithm for distributed system. 9
Explain different types of failures in DDBMS. 9
Discuss wait - die and wound – wait deadlock avoidance algorithm for distributed system. 9
Explain Wait-Die and Wound-Wait rules for deadlock avoidance in distributed system. 9

Вам также может понравиться