Professional Documents
Culture Documents
1
III B.Tech Supplimentary Examinations, Aug/Sep 2008
DATA BASE MANAGEMENT SYSTEMS
(Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
2. (a) Consider the following schema given. The primary keys are underlined.
Sailors(sailor-id, sailor-name, sailor-rating, sailor-age)
Boats(boat-id, boat-name, boat-color)
Reserves(sailor-id, boat-id, day)
3. What are the techniques used to improve the performance of disks in RAID. [16]
5. (a) Discuss the reasons for converting SQL queries into relational algebra queries
before optimization is done.
(b) What is meant by query execution plan? Explain its significance. [10+6]
6. (a) Compute the canonical cover (Fc ) of the following set F of functional depen-
dencies for relation scheme R =(A,B,C,D,E)
A− > BC
CD− > E
B− > D
E− > A
(b) Discuss the BCNF and III Normal Form with examples. [8+8]
1 of 2
Code No: RR321903 Set No. 1
8. Explain in detail the ARIES recovery method. [16]
⋆⋆⋆⋆⋆
2 of 2
Code No: RR321903 Set No. 2
III B.Tech Supplimentary Examinations, Aug/Sep 2008
DATA BASE MANAGEMENT SYSTEMS
(Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
1. (a) Explain the drawbacks of traditional file processing systems with examples.
(b) Explain the three levels of data abstraction. [7+9]
2. (a) Consider the following schema given. The primary keys are underlined.
Sailors(sailor-id, sailor-name, sailor-rating, sailor-age)
Boats(boat-id, boat-name, boat-color)
Reserves(sailor-id, boat-id, day)
3. What are differences among primary, secondary and clustering indices? How do
these differences affect the implementation of indices? Which of the indexes are
dense and which are not. [16]
7. (a) Develop an example showing how a single locking protocol could lead to a
dead lock .
(b) Explain about commit and roll back operations . [10+6]
1 of 2
Code No: RR321903 Set No. 2
8. (a) Explain the purpose of the check(D)point mechanism. [5]
(b) How does the frequency of check point affects the following:
i. System performance when no failure occurs.
ii. The time it takes to recovery from a system crash.
iii. The time it takes to recover from a disk crash. [3+4+4]
⋆⋆⋆⋆⋆
2 of 2
Code No: RR321903 Set No. 3
III B.Tech Supplimentary Examinations, Aug/Sep 2008
DATA BASE MANAGEMENT SYSTEMS
(Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
2. (a) Consider the following schema given. The primary keys are underlined.
Sailors(sailor-id, sailor-name, sailor-rating, sailor-age)
Boats(boat-id, boat-name, boat-color)
Reserves(sailor-id, boat-id, day)
1 of 2
Code No: RR321903 Set No. 3
4. (a) Discuss in detail the steps involved in processing a query.
(b) Explain any one of the algorithms for computing the join of relations. [8+8]
5. Discuss in detail about estimating the cost of an evaluation plan for a query block.
[16]
6. (a) Explain why the PJNF is more desirable normal form than 4NF.
(b) Explain Domain Key Normal Form(DKNF) with example. [8+8]
⋆⋆⋆⋆⋆
2 of 2
Code No: RR321903 Set No. 4
III B.Tech Supplimentary Examinations, Aug/Sep 2008
DATA BASE MANAGEMENT SYSTEMS
(Electronics & Computer Engineering)
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
⋆⋆⋆⋆⋆
2. (a) What are views? Discuss the problems encountered in modifying database
through views.
(b) What is an embedded SQL? Give examples. [10+6]
3. (a) Construct a B tree of order 2 to maintain the keys 1,9,8,6,4,5 and 10.
(b) Show how 4 is replaced by 7 in the tree constructed in the above question.
[8+8]
5. Discuss different types of parameters that are used in cost functions. Where is this
information kept? [16]
6. (a) Why are the certain functional dependencies called trivial functional depen-
dencies.
(b) compute the closer of (Ft) for the following set F of functional dependencies
for relation scheme R = (A,B,C,D,E)
A → BC
CD → E E →A
B →D
Using the functional dependencies compute the canonical cover Fc . [8+8]
1 of 2
Code No: RR321903 Set No. 4
(c) binary lock.
(d) live lock. [4+4+4+4]
8. (a) When a system recovers from a crash ? In what order must transaction be
Undone and Redone? Why is this order important?
(b) What is a log in the content of DBMS? How does check pointing eliminate
some of the problems associated with log based recovery? [8+8]
⋆⋆⋆⋆⋆
2 of 2