NALANDA OPEN UNIVERSITY QUESTION, 2016, M.C.A , Part-III, Paper-XXII (Advanced Database Management Systems)
NALANDA OPEN UNIVERSITY QUESTION, 2016, M.C.A , Part-III, Paper-XXII (Advanced Database Management Systems)
2016Time: 3 hours
Full marks: 80
Answer any five questions. All questions carry equal marks.
1. How do UML diagrams help in designing the database? Discuss with the help of an example. How does data granularity affect the performance of concurrency control? Do you think that data granularity and database security are interrelated ? Justify your answer.
2. Consider the following situation:-
"A company has two employee named "A" and "B". The company has two projects P1 and P2. Project P1 uses languages C and C++ , whereas project P2 uses languages C and JAVA. Employee whose name is "A" works on both the projects P1 and P2, whereas employee named "B" works on
project P2 only".
(i) Represent the information given above as a relation/ tables.
(ii) List the FDs and MVDs in the table above.
(iii) Normalize the table upto 4th Normal Form.
3. Compare and contrast the distributed DBMS environment with the centralized DBMS environment. What are semantic databases? List the features of semantic databases. Explain the process of searching the knowledge in these databases.
4. What do you mean by Deadlock? How can we prevent Deadlock? Write an algorithm that checks whether the concurrently executing transactions are in Deadlock or not.
5. What is a data warehouse? Describe the process of ETL (Extract, Transform and Load) for a data warehouse. What are datamarts? Briefly discuss the method of creating the data marts.
6. Explain the role of Query Optimizer in Oracle. Explain the algorithm and cost calculation for simple Hash join.
7. Differentiate between the following:-
(i) Embedded SQL and Dynamic SQL
(ii) XML and HTML
(iii) 2 PC and 3 PC protocol
(iv) JDBC versus ODBC
8. What are cursors, stored procedures and triggers? Give SQL Syntax for each and discuss the utility aspect of each.
9. Write a short notes, with suitable example, for each of the following:-
(i) Vendor - specific security
(ii) Multilevel security
10. Explain the following with the help of an example and diagram:-
(i) Role of system catalogue
(ii) Nested loop join
(iii) Timestamp and its use
(iv) Fragmentation and allocation schema
Comments
Post a Comment