MCA3020 – Advanced Database Management System





Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

Spring 2013
Masters in Computer Application (MCA) - Semester 3
MCA3020 – Advanced Database Management System – 4 Credits (Book ID: B1649)
(60 Marks)
Answer All the Questions. Each question carries equal marks. (12 x 5 = 60)

1. Discuss the classification of DBMS based on location of database.
Answer : DBMSs come in many shapes and sizes. For a few hundred dollars, you can purchase a DBMS for your desktop computer. For larger computer systems, much more expensive DBMSs are required. Many mainframe-based DBMSs are leased by organizations. DBMSs of this scale are highly sophisticated and would be extremely expensive to develop from scratch. Therefore, it is cheaper for an organization to lease such a DBMS program than to develop it.
Classification of DBMS :



2. Explain with examples different SQL commands used for creating and deleting relations. Write a short note on ACID properties of transaction model.
Answer : SQL Commands:
SQL commands are instructions used to communicate with the database to perform specific task that work with data. SQL commands can be used not only for searching the database but also to perform various other functions like, for example, you can create tables, add data to tables, or modify data, drop the table, set permissions for user. various commands are :
Data Definition Language (DDL) - These SQL commands are used for creating, modifying, and dropping the structure of database


3. Define functional dependency. Give examples. Also Explain 1st, 2nd and 3rd normal Forms.
Answer : In relational database theory, a functional dependency is a constraint between two sets of attributes in a relation from a database.
Given a relation R, a set of attributes X in R is said to functionally determine another set of attributes Y, also in R, (written X → Y) if, and only if, each X value is associated with precisely one Y value; R is then said to satisfy the functional dependency X → Y. Equivalently, the projection  is a function, i.e. Y is a function of X.[1][2] In simple words,

4. Explain the various heuristics involved in query optimization. Also explain the various algorithms for executing query operations.
Answer : : A query expressed in a high-level query language such as SQL must first be scanned, parsed, and validated. The scanner identifies the language tokens—such as SQL keywords, attribute names, and relation names—in the text of the query, whereas the parser checks the query syntax to determine whether it is formulated according to the syntax rules (rules of grammar) of the query language. The query must also be validated, by checking that all attribute and relation names are valid and semantically meaningful names in the schema of the particular database being queried. An internal representation of the query is then created, usually as a tree data structure called a query tree. It is also possible to represent the



5. Describe the most important classes of parallel machines.
Answer : Important classes of parallel machines:
The Multicomputer:
A parallel machine model called the multicomputer fits these   requirements. As illustrated in Figure   multicomputer comprises a number of von Neumann computers, or nodes, linked by an interconnection network. Each computer   executes its own program. This program may access local memory and may send and receive messages over the network. Messages are used to communicate with other computers or, equivalently, to



6. How is two phase locking method used to ensure serializability? Illustrate.
Answer : The two-phase locking method is a protocol that enforces all the locking operations in a transaction to occur before the first unlock operation of the transaction occurs. According to the two-phase locking protocol a transaction handles its locks in two distinct, consecutive phases during the transaction's execution:
Expanding phase (Growing


7. Explain the concept of database recovery management. Discuss the different levels of backup used for recovering data.
Answer : Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives, solid-state drives (SSD), USB flash drive, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system.
The most common "data recovery"


               
8. What are the different types of partitioning techniques? Describe in detail.
Answer :  Data partitioning and collecting in Data stage:
Partitioning mechanism divides a portion of data into smaller segments, which is then processed independently by each node in parallel. It helps make a benefit of parallel architectures like SMP, MPP, Grid computing and Clusters.
Collecting is the opposite of partitioning and can be defined as a process of bringing back data partitions into a single sequential stream (one data partition).
Data partitioning methods :


9. Discuss the concept of Type Hierarchies and Inheritance with example. Also illustrate multiple inheritances.
Answer : hierarchy  is an arrangement of items (objects, names, values, categories, etc.) in which the items are represented as being "above," "below," or "at the same level as" one another. Abstractly, a hierarchy can be modelled mathematically as a rooted tree: the root of the tree forms the top level, and the children of a given vertex are at the same level, below their common parent.
A hierarchy (sometimes abbreviated HR) can link entities either directly or indirectly, and either vertically or horizontally. The only direct links


                                                          
10. Explain the functions and components of DDBMS.
Answer : Functions of DDBMS :
We expect a DDBMS to have at least the functionality for a centralized DBMS. In addition, we expect a DDBMS to have the following functionality:
  • Extended communication services to provide access to remote sites and allow the transfer of queries and data among the sites using a network.
  • Extended system catalogue to store data distribution details.
  • Distributed query processing, including query optimization and remote data access.
  • Extended security control to maintain appropriate authorization/access privileges to the distributed data.


11. Differentiate between RDBMS, OODBMS and ORDBMS.
Answer : The presentation of the similarities and differences between relational modelling of data and the object oriented modelling of data is of great importance both for data base designers and for users. By being well acquainted with the relational model and by noting the similarities and differences between the two approaches to data modelling, designers will be able to turn into account and to make use of the already acquired experience as an important basis for understanding and learning the methodology of designing


12. What is active database? Explain what are the active rules for oracle?
Answer : An active database is a database that includes an event-driven architecture (often in the form of ECA rules) which can respond to conditions both inside and outside the database. Possible uses include security monitoring, alerting, statistics gathering and authorization.
Most modern relational databases include active database features in the form of database triggers.
 ACTIVE DATABASES COMMANDS:
Displays a subset of the information listed by




Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

No comments:

Post a Comment

Note: only a member of this blog may post a comment.