0% found this document useful (0 votes)
130 views1 page

Assignment No. 1: A) B) C) D) A) B)

This document contains assignments for a Database-II course. Assignment 1 includes questions about the relational data model, concurrency control approaches, normal forms, and database design for a student result management system. Assignment 2 includes questions about database security, recovery, transactions, distributed databases, and object-oriented data models. Students are asked to explain concepts, differentiate terms, provide examples, develop database tables, and describe algorithms.

Uploaded by

M Noaman Akbar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
130 views1 page

Assignment No. 1: A) B) C) D) A) B)

This document contains assignments for a Database-II course. Assignment 1 includes questions about the relational data model, concurrency control approaches, normal forms, and database design for a student result management system. Assignment 2 includes questions about database security, recovery, transactions, distributed databases, and object-oriented data models. Students are asked to explain concepts, differentiate terms, provide examples, develop database tables, and describe algorithms.

Uploaded by

M Noaman Akbar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Course: Database-II (3467)

Semester: Autumn 2020

ASSIGNMENT No. 1
Q. 1 Explain relational data model with examples. Explain that why it is preferred over hierarchical and
network data models.
Q. 2 Differentiate the following with suitable examples:
a) Optimistic Approach & Pessimistic Approach of Concurrency Control
b) Simple Normal Forms & Higher Normal Forms
c) Insertion Rule & Deletion Rule
d) System Privilege & Object Privilege
Q. 3
a) What conditions would make a 3NF relation violate Boyce-Codd Normal Form (BCNF)?
b) Discuss the purpose of Boyce–Codd Normal Form (BCNF) and discuss how BCNF differs from 3NF.
Provide an example to illustrate your answer.
Q. 4 Suppose you are designing database of students result management system for BS (CS). Develop sample
tables and apply normalization on it and also describe that to which level of normalization is applied.
Q. 5
a) What is deadlock? How deadlocks can be detected and prevented? Also explain the modules for
concurrency control.
b) Discuss database integrity with the help of examples.
ASSIGNMENT No. 2
Q. 1
a) Explain the purpose and scope of database security with real life examples.
b) Describe important reasons of database failure. Also explain database recovery methods.
Q. 2
a) The scope of database security extends beyond just DBMS controls. Discuss the role of the database
administrator in database security and recovery.
b) Write an algorithm that checks whether the concurrently executing transactions are in deadlock.
Q. 3
a) The consistency and reliability aspects of transactions are due to the “ACIDity” properties of
transactions. Discuss each of these properties and how they relate to the concurrency control and
recovery mechanisms. Give examples to illustrate your answer.
b) Explain the concepts of serial, non-serial and serializable schedules. State the rules for equivalence of
schedules.
Q. 4
a) Describe the features of a distributed database management system (DDBMS).
b) One problem area with DDBMSs is that of distributed database design. Discuss the issues that have to
be addressed with distributed database design. Discuss how these issues apply to the global system
catalog.
Q. 5
a) Compare and contrast the different definitions of object-oriented data models.
b) What is pointer swizzling? Describe the different approaches to pointer swizzling.

You might also like