0% found this document useful (0 votes)
13 views

DBMS II-Question Bank

Uploaded by

tanveshpadyal3
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

DBMS II-Question Bank

Uploaded by

tanveshpadyal3
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Question Bank

BCA- 232 : DATABASE MANAGEMENT SYSTEMS-II


(2019 Pattern) (Semester - III)
Choose the correct option (1 Mark)
1. Record is a _____
i) Placeholder ii) Datatype iii) Variable iv) Keyword
2. The execution sequences in concurrency control are termed as ____________
i)Serial ii)Organization iii)Schedule iv)Time tables
3. The default timestamp ordering protocol generates schedule that are _____
i)Recoverable ii)Starving iii)non-recoverable iv)none of the mentioned
4. A ______is alternative of log-based recovery
i)disk recovery ii)disk shadowing iii)shadow paging iv)crash recovery
5. The typical technique of discretionary access control in databasesystem is based on the
____of privilege
i)Commit and Rollback ii) Granting & revoking
iii)Serial and non-serial iv) All the above
6. A_____is used to throw the exception in PL/SQL.
i)THROW ii)NOTICE iii)RAISE iv)WARNING
7. Record is ____.
i)Placeholder ii)Datatype iii)Variable iv)Keyword
8. _____is not type of parallel database.
i)Shared memory ii)Shared nothing iii)Shared disk iv)Shared processor
9. d) Log record contains ____.
i)Old value ii)New value iii)Both (i) & (ii) iv)Error value
10. Prevention of access to the database by unauthorized users isreferred to as ____.
i)Integrity ii)Security iii)Productivity iv)Reliability
11. Collection of operations that form a single logical unit of work iscalled_____.
i)View ii)Structure iii)Network iv)Transaction
12. If a transaction may obtain locks but may not release any locksthen it is in____phase.
i)Growing ii)Deadlock iii)Shrinking iv)Starved
13. A _____is a special kind of a store procedure that executes in response to certain action on
table like insertion, deletion or updating of data.
14. i)Procedure ii)Function iii)Trigger iv)View
15. The _____Property assures that once transaction Completes successfully, all updates that it
carried out on database persists,even if system crashes.
i)Atomicity ii)Isolation iii)Consistency iv)durability
16. _____deadlock detection technique is preemptive.
i)Wait-die ii)Wound wait wound iii)Wound-wait iv)Wait-die wound
17. No-UNDO, REDO Policy is also known as _____
i)Deferred update ii)Buffered management iii)Immediate update iv)Shadow
paging
18. Prevention of access to database by unauthorized user is referred as _____
i)Integrity ii)Security iii)Consistency iv)Reliability
19. In _____system, each entity is treated as an object
i)Parallel database ii)Relational database
iii)Object oriented Database iv)Distributed database
Answer the following (1 Mark )
1. What is meaning of variadic function argument type?
2. b) Define concurrent schedule.
3. c) Show compatibility matrix for shared and exclusive lock.
4. d) What are the contents of log? e) Give the syntax of GRANT command.
5. What is view?
6. b) What is schedule?
7. c) What is Timestamp?
8. d) Enlist various types of errors e) What is shared memory.
9. What is function?
10. What is Schedule?
11. What is lock?
12. Enlist various types of errors in transaction failure.
13. List types of server systems.
14. Define view.
15. List the properties of transaction.
16. What is cascading rollback of transaction?
17. What is use of GRANT command?
18. List different types of database system architecture.

Answer the following (3 Mark)


1. What is Exception? How to handle exception in postgresql.
2. Explain cascadeless schedule.
3. State and explain Thomas write rule.
4. Explain Log based recovery.
5. Discuss the database security threats.
6. Explain client/Server system architecture.
7. Define view. Explain how to create view with example.
8. What is serializability? Explain conflict serializability.
9. Define terms 1)Strict 2PL 2)Rigorous 2PL 3)Conservative 2PL
10. What is system crash? Explain in detail.
11. Write a note on statistical database security.
12. State the features of distributed databases.
13. What is exception? How to handle exception in Postgressql?
14. Explain wound - wait deadlock prevention algorithm.
15. Explain the states of transaction using state diagram.
16. What is shadow paging?
17. What is simple and star security property?
18. Write short note on parallel systems
19. Write structure of PL/PgSQL code block
20. What do you mean by cascade less, strict and non recoverable schedule?
21. Discuss the variations of two phase locking protocol.
22. What are the reasons of transaction failure?
23. Explain the components of client server architecture?
24. How DBA is responsible for security of database systems?
Answer the following (4 Marks)
1. What is function? Explain with example.
2. With suitable diagram explain different states of transaction.
3. Describe Deferred update modification with example.
4. Explain various methods for database security in brief.
5. Explain client / Server architecture
6. Consider following database:
Student (sno, sname, sclass, saddr)
Teacher (tno, tname, qualification, experience)
Relationship between Student and Teacher is M-M with descriptive attribute subject.
Create a trigger for following: Write a trigger before insert the record of student table. If
sno is less than or equal to zero give message “Invalid Number”.
7. What is cursor? Explain types of cursor with example.
8. What is Serializability? Explain view Serializability with example
9. What is checkpoint?
10. Explain different types of failure in detail.
11. e) Explain methods for database security.
12. Explain two-tier client-server structure. Also state advantages & disadvantages of it.
13. Write a short note on cascadeless schedule.
14. What is cursor? Explain types of cursor with example.
15. What is Serializability? Explain view Serializability with example
16. What is checkpoint?.
consider the following log entries at the time of system crash.
[start - transaction, T1 ]
[write - item, T1 , A, 10]
[commit T1 ]
[start - transaction, T3 ]
[write -item T3 , B, 15]
[checkpoint] [commit T3 ]
[start - transaction T2 ]
[write -item T2 , B, 20]
[start - transaction, T4 ]
[write - item T4 , D, 25]
[write - item T2 System crash, C, 30]
If immediate update technique with checkpoint is used, what will be recovery procedure?
17. Explain statistical database security with suitable example.
18. Discuss the benefits of client server system.
19. What is need of concurrency control? Explain two phase locking protocol.
20. Consider student - teacher database
Student (Sno integer, s-name char(30),
S-class char (10) S-addr char (50))
Teacher (tno integer, t-name char(20), qualification char (10) experience integer)
The relationship student - teacher is many-many with descriptive attribute subject name
and marks.
a)Create a view containing details of all the teachers teaching the subject Mathematics.
b)Create a view to list the details of all the students who are taught by a teacher having
experience of more than 3 years.
21. Explain the timestamp ordering protocol for concurrency.
22. Write note on shadow paging.
23. Explain the mandatory access control for multilevel security.
24. Explain the distributed database management system.
25. Check whether given schedule S is conflict serializable or not
S : R1 (A), R2 (A), R1 (B), R2 (B), R3 (B), W1 (A), W2 (B)
26. Following is list of events in an interleaved execution of set T1, T2, and T3 assuming 2PL.
Is there any deadlock? If yes, which transactions are involved in deadlock?
Time Tansaction Code
t1 T1 Lock (A,X)
t2 T2 Lock (B,S)
t3 T3 Lock (A,S)
t4 T1 Lock (C,X)
t5 T2 Lock (D,X)
t6 T1 Lock (D,S)
t7 T2 Lock (C,S)

27. What is trigger ? Explain the syntax to create trigger along with its advantages.
28. Following is the list of events in an interleaved execution of set T1 , T2 , T3 and T4
assuming 2PL. IS there a deadlock? If yes which transactions are involved in a deadlock?

29. Consider the following transaction Give 2 non serial schedules that are serializable

30. Consider the following transaction. Give two non-serial schedule

31. Following is the list of events in an interleaved execution of set T1 , T2 , T3 and T4


assuming 2PL. Is there a Deadlock? If yes which transactions are involved in Deadlock?
Attempt the following(5 Marks)
1) Consider following database
student (Sno, Sname, Sclass, Saddr)
Teacher (tno, tname, qualification, experience)
The relatioship of student and teacher is M-M with descriptive attribute as subject &
Marks write a trigger before deleting a student record from the student table. Raise notice
and display the message “Student record is being deleted”.
2) Explain variation of 2 phase locking protocol
3) What is checkpoint? How are they useful in crash recovery.
4) Consider following database
Movie (mno, mname, relese-year, budget)
Actor (ano, aname, role, charges, addr)
Relationship between movie and Actor is M-M .
Write a function to list moviewise charges of Amitabh Bachchan.
5) Following are the log entries at the time of system crash System Crush

deferred update technique with checkpoint is used, what will be the recovery procedure?
6) What is deadlock? Explain Deadlock detection and prevention technique.
7) Consider following database
Movie (mno, mname, release_year, budget)
Actor (ano, aname, role, charges, addr)
Relationship between Movie and Actor is M-M Write a stored function to accept movie
name as input and print the name of actors working in that movie.
8) Explain Deadlock Recovery Techniques.
9) Consider the following schedule and draw precedence graph for that state whether
schedule is serializable or not.

10) Consider following database


Movie (mno, mname, release_year, budget)
Actor (ano, aname, role, charges, addr)
Relationship between Movie and Actor is M-M Write a stored function to accept movie
name as input and print the name of actors working in that movie.
11) Consider the following transactions. Give two non-serial schedule that are serializable
<T1,T2>

12) Consider the following log image, that is obtained during recovery after crash:

13) What is a cursor? How to declare it? Explain with example.


14) List and Explain properties of transaction.
15) What is shadow paging? State advantages and disadvantages of shadow paging.
16) What is database security? Discuss different encryption techniques for database security.
17) What is log based recovery? Explain deferred modification technique and immediate
modification for log based recovery.
18) Consider the following list of events in an interleaved execution of set of transaction T1 ,
T2 , T3 and T4 assuming 2PL Is there a deadlock? If yes, which transactions are involved
in deadlock.
19) Explain conflict serializability. Check whether given schedule S is conflict serializable or
not. If yes, then determine all possible serialized schedules.

20) Explain timestamp based protocol for concurrency control.


21) Explain classification of client server architecture.
22) Consider student - teacher database student
(Sno integer, s-name char (30), S-Class (10), S-addr char (50)).
Teacher (tno integer, t-name char (20), qualification char (15), experience integer)
The relationship student - teacher is many - many with descriptive attribute as subject
name and marks. Write a function to accept name of subject and count the number of
teachers who teach that subject.
23) Define transaction. Discuss the properties of transaction.
24) Explain the concept of locks with multiple granularity.
25) Discuss the encryption technique for security.
26) What are the steps to manage explict cursor?
write the cursor which will accept year and display all movies released in that year for
following table
Film (film_id, title, description, release_year, language_id, rental_ duration, rental_rate,
length, replacement_cost)

27) Explain the deferred update technique of log based recovery following are the log entries
at time of system crash.

If a deferred update technique with check point is used, what will be recovery procedure
28) Consider the following transactions. Give two non-serial schedules that are serializable.

29) What is view? write syntax to create view? How views are useful in database security.
30) Following is the list of events in an interleaved execution of set T1 , T2 , T3 and T4
assuming 2PL.
Is there a Deadlock? If yes which transactions are involved in Deadlock?

**************

You might also like