Professional Documents
Culture Documents
1
II B.Tech I Semester Supplimentary Examinations, May/Jun 2009
DATA BASE MANAGEMENT SYSTEMS
( Common to Computer Science & Engineering, Information Technology
and Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
2. (a) What is the difference between a candidate key and the primary key for a
given relation? What is a super key?
(b) Explain the statement that relational algebra operators can be composed.
Why is the ability to compose operators important? [8+8]
3. For the following relational database, give the expressions in SQL. [16]
Sailor schema (sailor id, sailorname, rating, Age)
Reserves (sailor id, Boat)id, day)
Boat Schema(Boat id, boatname, color)
(a) Find the names of sailors who are older then the oldest sailors with rating of
10?
(b) Find the age of the youngest sailors for each rating level?
(c) Find the age of the youngest sailor who is eligible to vote(i.,e. 18 years) for
each rating level with at least two such sailors?
(d) Find the no of reservations for each red boat?
(e) find the average age of the sailors who are eligible for voting for each rating
level that has at least two sailors?
(f) Find the average of the sailors who are eligible for voting for each rating level
that has at least two such sailors?
(g) Find those ratings for which the average age of sailors is the minimum over
all the ratings?
(h) Find the no of reservations for each red boat?
6. (a) What are the merits & demerits of using fuzzy dumps for media recovery. [6]
1 of 2
Code No: 33071 Set No. 1
(b) Explain the phases of ARIES Algorithm. [4]
(c) Explain 3 main properties of ARIES Algorithm [6]
⋆⋆⋆⋆⋆
2 of 2
Code No: 33071 Set No. 2
II B.Tech I Semester Supplimentary Examinations, May/Jun 2009
DATA BASE MANAGEMENT SYSTEMS
( Common to Computer Science & Engineering, Information Technology
and Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
⋆⋆⋆⋆⋆
1 of 1
Code No: 33071 Set No. 3
II B.Tech I Semester Supplimentary Examinations, May/Jun 2009
DATA BASE MANAGEMENT SYSTEMS
( Common to Computer Science & Engineering, Information Technology
and Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
1. (a) What are the types of languages a database system provides? Explain.
(b) What are the five main functions of a Database Administrator? [8+8]
2. (a) What is a foreign key constraint? Why are such constraints important? What
is referential integrity?
(b) How many distinct tuples are in a relation instance with cardinality 22? [8+8]
5. (a) Define the concept of schedule for a set of concurrent transaction. Give a
suitable example. [8]
(b) Explain read-only, write-only & read-before-write protocols in serialazability.
[8]
6. (a) What are the roles of Analysis, Redo & Undo phase in Aries. [8]
(b) How is the recovery manager is responsible for transaction atomicity & dura-
bility. [8]
7. Compare the Heap file organization and Sequential file organization. [16]
8. What are the intuitions for tree indexes? and Explain about ISAM. [16]
⋆⋆⋆⋆⋆
1 of 1
Code No: 33071 Set No. 4
II B.Tech I Semester Supplimentary Examinations, May/Jun 2009
DATA BASE MANAGEMENT SYSTEMS
( Common to Computer Science & Engineering, Information Technology
and Computer Science & Systems Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
1. Discuss the basic issues in the design of an E-R database schema. [16]
2. (a) What is the difference between a candidate key and the primary key for a
given relation? What is a super key?
(b) Explain the statement that relational algebra operators can be composed.
Why is the ability to compose operators important? [8+8]
3. Write the Equivalence Rules for the transportation of Real Expressions. [16]
6. What is two phase locking protocol ? how does it guarantee serialazability. [16]
7. List the physical storage media available on the computers youu use routinely. Give
the speed with which data can be accessed on each mediaum. [16]
8. What are the causes of bucket overflow in a hash file organization? What can be
done to reduce the occurrence of bucket overflows? [16]
⋆⋆⋆⋆⋆
1 of 1