Dear students get fully solved assignments
call us at :- 08263069601
or
mail us at
help.mbaassignments@gmail.com
Spring 2013
Masters in Computer
Application (MCA) - Semester 3
MCA3020 – Advanced
Database Management System – 4 Credits (Book ID: B1649)
(60 Marks)
Answer All the Questions. Each question carries equal marks. (12 x 5 =
60)
1. Discuss the classification of DBMS based on location of database.
Answer : DBMSs come in many
shapes and sizes. For a few hundred dollars, you can purchase a DBMS for your
desktop computer. For larger computer systems, much more expensive DBMSs are
required. Many mainframe-based DBMSs are leased by organizations. DBMSs of this
scale are highly sophisticated and would be extremely expensive to develop from
scratch. Therefore, it is cheaper for an organization to lease such a DBMS
program than to develop it.
Classification of DBMS :
2. Explain with examples different SQL commands used for creating and
deleting relations. Write a short note on ACID properties of transaction model.
Answer : SQL Commands:
SQL commands are instructions
used to communicate with the database to perform specific task that work with
data. SQL commands can be used not only for searching the database but also to
perform various other functions like, for example, you can create tables, add
data to tables, or modify data, drop the table, set permissions for user.
various commands are :
Data Definition Language (DDL) - These SQL commands are used for
creating, modifying, and dropping the structure of database
3. Define functional dependency. Give examples. Also Explain 1st, 2nd
and 3rd normal Forms.
Answer : In relational database
theory, a functional dependency is a constraint between two sets of attributes
in a relation from a database.
Given a relation R, a set of
attributes X in R is said to functionally determine another set of attributes
Y, also in R, (written X → Y) if, and only if, each X value is associated with
precisely one Y value; R is then said to satisfy the functional dependency X →
Y. Equivalently, the projection is a
function, i.e. Y is a function of X.[1][2] In simple words,
4. Explain the various heuristics involved in query optimization. Also
explain the various algorithms for executing query operations.
Answer : : A query expressed in a
high-level query language such as SQL must first be scanned, parsed, and
validated. The scanner identifies the language tokens—such as SQL keywords,
attribute names, and relation names—in the text of the query, whereas the
parser checks the query syntax to determine whether it is formulated according
to the syntax rules (rules of grammar) of the query language. The query must
also be validated, by checking that all attribute and relation names are valid
and semantically meaningful names in the schema of the particular database being
queried. An internal representation of the query is then created, usually as a
tree data structure called a query tree. It is also possible to represent the
5. Describe the most important classes of parallel machines.
Answer : Important classes of parallel machines:
The Multicomputer:
A parallel machine model called
the multicomputer fits these
requirements. As illustrated in Figure
multicomputer comprises a number of von Neumann computers, or nodes,
linked by an interconnection network. Each computer executes its own program. This program may
access local memory and may send and receive messages over the network.
Messages are used to communicate with other computers or, equivalently, to
6. How is two phase locking method used to ensure serializability?
Illustrate.
Answer : The two-phase locking
method is a protocol that enforces all the locking operations in a transaction
to occur before the first unlock operation of the transaction occurs. According
to the two-phase locking protocol a transaction handles its locks in two
distinct, consecutive phases during the transaction's execution:
Expanding phase (Growing
7. Explain the concept of database recovery management. Discuss the
different levels of backup used for recovering data.
Answer : Data recovery is the
process of salvaging data from damaged, failed, corrupted, or inaccessible
secondary storage media when it cannot be accessed normally. Often the data are
being salvaged from storage media such as internal or external hard disk drives,
solid-state drives (SSD), USB flash drive, storage tapes, CDs, DVDs, RAID, and
other electronics. Recovery may be required due to physical damage to the
storage device or logical damage to the file system that prevents it from being
mounted by the host operating system.
The most common "data
recovery"
8. What are the different types of partitioning techniques? Describe in
detail.
Answer : Data partitioning and collecting
in Data stage:
Partitioning mechanism divides a
portion of data into smaller segments, which is then processed independently by
each node in parallel. It helps make a benefit of parallel architectures like
SMP, MPP, Grid computing and Clusters.
Collecting is the opposite of
partitioning and can be defined as a process of bringing back data partitions
into a single sequential stream (one data partition).
Data partitioning methods :
9. Discuss the concept of Type Hierarchies and Inheritance with
example. Also illustrate multiple inheritances.
Answer : hierarchy is an arrangement of items (objects, names,
values, categories, etc.) in which the items are represented as being
"above," "below," or "at the same level as" one
another. Abstractly, a hierarchy can be modelled mathematically as a rooted
tree: the root of the tree forms the top level, and the children of a given
vertex are at the same level, below their common parent.
A hierarchy (sometimes
abbreviated HR) can link entities either directly or indirectly, and either
vertically or horizontally. The only direct links
10. Explain the functions and components of DDBMS.
Answer : Functions of DDBMS :
We expect a DDBMS to have at
least the functionality for a centralized DBMS. In addition, we expect a DDBMS
to have the following functionality:
- Extended communication services to provide access to remote sites and allow the transfer of queries and data among the sites using a network.
- Extended system catalogue to store data distribution details.
- Distributed query processing, including query optimization and remote data access.
- Extended security control to maintain appropriate
authorization/access privileges to the distributed data.
11. Differentiate between RDBMS, OODBMS and ORDBMS.
Answer : The presentation of the
similarities and differences between relational modelling of data and the
object oriented modelling of data is of great importance both for data base
designers and for users. By being well acquainted with the relational model and
by noting the similarities and differences between the two approaches to data
modelling, designers will be able to turn into account and to make use of the
already acquired experience as an important basis for understanding and learning
the methodology of designing
12. What is active database? Explain what are the active rules for
oracle?
Answer : An active database is a
database that includes an event-driven architecture (often in the form of ECA
rules) which can respond to conditions both inside and outside the database.
Possible uses include security monitoring, alerting, statistics gathering and
authorization.
Most modern relational databases
include active database features in the form of database triggers.
ACTIVE
DATABASES COMMANDS:
Displays a subset of the
information listed by
Dear students get fully solved assignments
call us at :- 08263069601
or
mail us at
help.mbaassignments@gmail.com
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.