Вы находитесь на странице: 1из 8

Code No: RR220502

Set No. 1

II B.Tech II Semester Supplimentary Examinations, Aug/Sep 2008 DATA BASE MANAGEMENT SYSTEMS

( Common to Computer Science & Engineering, Information Technology and Computer Science & Systems Engineering)

Time: 3 hours

Max Marks: 80

Answer any FIVE Questions All Questions carry equal marks ⋆ ⋆ ⋆ ⋆ ⋆

(a)

1. Consider the following schema for a COMPANY database Employee (Name, SSN, Address, Sex, Salary, Dnumber) Department (Dname, Dnumber, MGRSSN, MGRSTART date) Dept-locations (Dnumber, Dlocations) Project (Pname, Pnumber, Plocation, Dnumber) Works-on (ESSN, Pnumber, Hours) Dependent (ESSN, Dependent-name, Sex, Bdate, Relationship)

Write the queries in Relational Algebra to

i. Retrieve all employees who either work in department 4 and make over 25,000 per year or work in department 5 and make over 30,000

ii. Retrieve the Social Security numbers of all employees who either work in department 5 or directly supervise a employee who works in department

5.

iii. Retrieve the name and address of all employees who work for the “Re- search” department

iv. List all the projects on which employee “Smith” is working. [3+3+3+3]

(b)

What is relational completeness? If a query language is relationally complete,

can you write any desired query in that language

[4]

(a)

2. Give the various methods of managing data security.

(b)

Describe the “dynamic SQL”.

[8+8]

3. Consider the two internal organizations for heap files (using lists of pages and a directory of pages).

(a)

Describe them briefly and explain the trade-offs. Which organization would you choose if records are variable in length.

(b)

Can you suggest a single page format to implement both internal file organi-

zations?

[8+8]

4. Discuss the merits and demerits of hash join, sort-merge join and block nested lo ops

join.

1 of 2

[16]

Code No: RR220502

Set No. 1

(a)

5. Write short notes on

 

- cost-based optimization

- heuristic optimization

(b)

Detail on the structure of query optimization.

[5+5+6]

(a)

6. Explain functional dependencies and multivalued dependencies with examples.

(b)

Consider the relation R(A,B,C,D,E,F) and FD’s

 

A

BC

F A

C

A

D

E

E D

is the decomposition of R into R 1 (A,C,D), R 2 (B,C,D) and R 3 (E,F,D) loss

less? Explain the requirement of loss less decomposition.

[8+8]

(a)

7. Explain Binary locks, Shared Locks and Exclusive locks ?

(b)

What is the two phase locking protocal? How does is guarantee serializability.

 

[6+10]

(a)

8. When a system recovers from a crash ? In what order must transaction be Undone and Redone? Why is this order important?

(b)

What is a log in the content of DBMS? How does check pointing eliminate some of the problems associated with log based recovery? [8+8]

⋆ ⋆ ⋆ ⋆ ⋆

2 of 2

Code No: RR220502

Set No. 2

II B.Tech II Semester Supplimentary Examinations, Aug/Sep 2008 DATA BASE MANAGEMENT SYSTEMS

( Common to Computer Science & Engineering, Information Technology and Computer Science & Systems Engineering)

Time: 3 hours

Answer any FIVE Questions All Questions carry equal marks ⋆ ⋆ ⋆ ⋆ ⋆

Max Marks: 80

1.

(a)

What is an unsafe query? Give an example and explain why it is important

 

to disallow such queries.

 

[6]

 

(b)

Consider the following schema given. The primary keys are underlined. PROJECT(Projectnu Project Name, Chief Architect) EMPLOYEE( Empnum , Empname)

 

ASSIGNED TO(Projectnum, Empnum)

 

Write the following queries in Tuple relational calculus

 

i. Find Empnum of employees working on project COMP454

ii. Find the details of employees(both number and name) working on the project COMP365

iii. Find the details of employees working on the “Database” project

iv. Find the Empnum?s of employees who do not work on project COMP464

v. Find the Empnum?s of employees who work on all projects. [1+2+2+2+3]

2.

(a)

what are the various salient features of the QBE ?

[7]

(b)

Explain the following :

 
 

i. Relational database query.

ii. Query language

iii. SQL

iv. Embedded SQL.

 

[2+2+2+3]

3.

(a)

Construct a B tree of order 2 to maintain the keys 1,9,8,6,4,5 and 10.

(b)

Show how 4 is replaced by 7 in the tree constructed in the above question.

 

[8+8]

4.

Give a detailed account of the following:

 
 

(a)

Query evaluation plans.

(b)

Pipelined evaluation.

 

[8+8]

5.

Discuss in detail about estimating the cost of an evaluation plan for a query block.

 

[16]

6.

(a)

Explain why 4NF is more desirable Normal Form than BCNF.

1 of 2

Code No: RR220502

Set No. 2

(b) Consider the relation R(A,B,C,D,E) and FD’s A > BC C > A D> E F> A E > D Is the Decomposition R in to R1(A,C,D) , R2(B,C,D) and R3(E,F,D) loss less? Explain the requirement of lossless decomposition. [8+8]

7. (a) Explain the concept of log based recovery.

(b) Briefly explain why recovery is needed.

[10+6]

8. (a) When a system recovers from a crash ? In what order must transaction be Undone and Redone? Why is this order important?

(b) What is a log in the content of DBMS? How does check pointing eliminate some of the problems associated with log based recovery? [8+8]

⋆ ⋆ ⋆ ⋆ ⋆

2 of 2

Code No: RR220502

Set No. 3

II B.Tech II Semester Supplimentary Examinations, Aug/Sep 2008 DATA BASE MANAGEMENT SYSTEMS

( Common to Computer Science & Engineering, Information Technology and Computer Science & Systems Engineering)

Time: 3 hours

Max Marks: 80

Answer any FIVE Questions All Questions carry equal marks ⋆ ⋆ ⋆ ⋆ ⋆

(a)

1. Consider the following schema Suppliers(sid , sname, saddress) Parts(pid, pname, color)

Catalog(sid, pid, cost)

The key fields are underlined. Write the following queries in relational algebra

i. Find the names of suppliers who supply blue part

ii. Find the sids of suppliers who supply every red part

iii. Find the pids of parts that are supplied by at least two different suppliers

iv. Find all the pids of parts supplied by supplier with sid=200

v. Find the pids of parts supplied by every supplier at less than Rs 500.

[2+2+2+2+2]

(b)

Given two relations R1 and R2 , where R1 contains N1 tuples, R2 contains N2 tuples, and N2 > N1 > 0 , give the minimum and maximum possible sizes (in tuples) for the result relation produced by each of the following relational algebra expressions. In each case, state any assumptions about the schemas for R1 and R2 that are needed to make the expression meaningful.

i. Selecting all the tuples from R1 where a=5

ii. Projecting the attribute b from R2

iii. R1 X R2

[2+2+2]

(a)

2. Give the various methods of managing data security.

(b)

Describe the “dynamic SQL”.

[8+8]

(a)

3. Explain the limitations of static hashing. Explain how this is overcome in dynamic hashing.

(b)

Write a note on indexed sequential files.

[10+6]

(a)

4. Explain external sort - merge algorithm.

(b)

Discuss about estimation of the size of joins.

[10+6]

5. Discuss different types of parameters that are used in cost functions. Where is this

6.

information kept?

[16]

(a) List the three design goals for relational database and explain why they are desirable.

1 of 2

Code No: RR220502

Set No. 3

(b)

Consider the relation scheme Emp Dept( Ename, SSN, Bdate, Address, Dnum- ber, Dname, DMGRSSN) and the following set of FD’s F={ SSN > Ename,Bdate, Address, Dnumber Dnumber> Dname, DMGRSSN} Calculate the closer {SSN} + and { Dnumber} + with respect to F. [6+10]

7. (a) Consider two transactions as follows:

Transaction 1: Fac salary:=Fac salary+1025.00 Transaction 2: Fac salary:= Fac salary *1.1 What precaution, if any, would you suggest if these were to run concurrently? Write a pseudo code program for these transactions using an appropriate scheme to avoid undesirable results.

(b) Explain Wait-die and Wound-wait in Deadlock prevention? [8+8]

8. (a) What are different Recovery Techniques used in Transaction Failures?

(b) Explain how System Crash and Media Failure occurs?

⋆ ⋆ ⋆ ⋆ ⋆

2 of 2

[10+6]

Code No: RR220502

Set No. 4

II B.Tech II Semester Supplimentary Examinations, Aug/Sep 2008 DATA BASE MANAGEMENT SYSTEMS

( Common to Computer Science & Engineering, Information Technology and Computer Science & Systems Engineering)

Time: 3 hours

Max Marks: 80

Answer any FIVE Questions All Questions carry equal marks ⋆ ⋆ ⋆ ⋆ ⋆

1. Distinguish between DDL and DML.

2.

Explain the following :

(a)

(b) Explain various integrity constraints. (a) what are the various salient features of the QBE ?

(b)

i. Relational database query.

ii. Query language

iii. SQL

iv. Embedded SQL.

[6+10]

[7]

[2+2+2+3]

3. What are differences among primary, secondary and clustering indices? How do

these differences affect the implementation of indices? Which of the indexes are

dense and which are not.

[16]

(a)

4. Consider the following SQL query for a bank database SelectT.branch name F rombranchT, branchS whereT.Assets ¿ S.assetsandS.branch city = ”HY DERABAD Write an efficient relational algebra expression that is equivalent to the query.

(b)

Define query optimization and at what point during query processing does

[8+8]

5. Discuss different types of parameters that are used in cost functions. Where is this

optimization occur?

information kept?

[16]

(a)

6. Explain the following terms

 

i. Relationship instance

ii. Composite attribute

iii. Multivalued attribute

iv. Derived attribute.

[2+2+2+3]

(b)

Construct an E-R diagram for a car insurance company with a set of customers,

each of whom owns a number of cars. Each car has a number of recorded accidents associate with it. Determine the entities and relationships that exists between the entities. Also construct the tabular representation of the entities

and relationships.

[7]

1 of 2

Code No: RR220502

Set No. 4

(a)

7. Define these terms atomicity, consistency, isolation, durability, schedule, blind write.

(b)

Write a note on the properties of tansactions.

[12+4]

(a)

8. When a system recovers from a crash ? In what order must transaction be Undone and Redone? Why is this order important?

(b)

What is a log in the content of DBMS? How does check pointing eliminate some of the problems associated with log based recovery? [8+8]

⋆ ⋆ ⋆ ⋆ ⋆

2 of 2