You are on page 1of 1

NR

Code No: NR-31/MCA


M.C.A. III-Semester Examinations, December-2006.
DATABASE MANAGEMENT SYSTEMS

Time: 3 hours Max. Marks: 60


Answer any FIVE questions
All questions carry equal marks
---
1.a) List and describe various data models.
b) What are the main differences between a file processing system
and a DBMS
2. Consider the following relational database. For each of the
following queries, give an expression in the relational algebra,
the tuple relational calculus and the domain relational calculus.
Employee (employee-name, street, city)
Works (employee-name, company-name, salary)
Company (company-name, city)
Manager (employee-name, manager-name)
i) Find the names and cities of residence of all employees
who work for First Bank Corporation
ii) Find the names and cities of residence of all employees
who work for First Bank Corporation and earn more than
$ 100,000 per annum.
3.a) Explain the difference between a weak and a strong entity set.
b) Define the concept of aggregation. Give two examples where this
concept is useful.
4.a) Explain why 4NF is more desirable than BCNF.
b) Give an example of a relation schema R and a set of
dependences such that R is in B CNF but not in 4 NF
5.a) Give a brief note about RAID levels. Distinguish their merits.
b) Construct a B+-tree for the following set of Key values, where the
number of pointers that will fit in one node are four.
(2, 3, 5, 7, 11, 17, 19, 23, 29, 31)
6. Consider the relation r1 (A,B,C), r2 (C,D,E) and r3 (E,F) with
primary Keys A,C and E respectively. Assume that r1 has 1000
tuples, r2 has 1500 tuples and r3 has 750 tuples. Estimate the
size of r1 r2 r3 (joins of r1, r2, r3) and give an efficient
strategy for computing the join.
7.a) Illustrate how the time-stamp-ordering protocol works.
b) What are the merits of rigorous two-phase locking over other
forms of two-phase locking.
8.a) Briefly discuss about various log-based recovery schemes. What
are their respective merits and demerits.
b) Compare the shadow-paging recovery scheme with log-based
recovery schemes in terms of ease of implementation and
overhead costs.
*****

You might also like