Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Describe decomposition of a database in database design. Why consolidation of database after normalization is considered during designing a database.
What do you mean by a system log? What is the purpose of the system log in system recovery?
When does a server Roll Forward and rollback a Transaction. What is a Transaction? What are the properties of a Transaction? What are different transaction states?
Write down the difference between tuple relational calculus and domain relational calculus?
What is structured query language? How the DDL and DML are different? Describe.
Write down the difference between the strong entity set and weak entity set?
Sketch a Privacy preserving clustering method so that a data owner would be able to ask third party to mine the data for quality clustering without worrying about the potential inappropriate disclos
Write down three application examples of spatiotemporal data mining. Identify and explain the main challenges in spatiotemporal data mining.
Describe the concepts of Horizontal Fragmentation and Vertical Fragmentation.
Explain how does SQL implement the entity integrity and referential integrity constraints of the relational data model? Describe with an illustration.
Illustrate the difference between the procedural and non-procedural DMLs?
Describe the characteristic aspects of RISC and CISC processor. State the conditions in which RISC and CISC processors are preferable.
What do you mean by cache coherence? How can the problem are solved with a snoopy cache controller?
Write down the actions taken by recovery manager during check pointing. Describe the architecture of distributed databases.
Compare and contrast the DMA based data transfer with program control data transfer.
Two new elements ‘1’ and ‘7’ are inserted in the heap in that order. Describe the level-order traversal of the heap after the insertion of such elements?
What do you mean by lock? Expalin the types of locks used in concurrency control.
Describe the purpose of Boyce-Codd normal form and describe how BCNF differs from and is stronger than 3NF. Demonstrate your answer with suitable example.
Distinguish between the operational systems and Data warehouse. As well describe how these are employed for information.
Describe the system development life cycle in the Data warehouse environment. How it is distinct from the classical SDLC?
Describe the relative benefits of centralized and distributed databases.
Explain the conditions where each of the different isolation levels would be helpful for transaction processing.
Now write down the queries in relational algebra to: a) List out the title of books reserved by the Professors older than 45 years.
Each of the given situations concerns the relationship set among the teacher and the student. Draw an ER diagram which explains it (supposing that no further constraints hold).
List some of the significant differences between the file-processing system and a DBMS.