You are on page 1of 2

ALLAMA IQBAL OPEN UNIVERSITY, ISLAMABAD

(Department of Computer Science)


WARNING
1. PLAGIARISM OR HIRING OF GHOST WRITER(S) FOR SOLVING
THE ASSIGNMENT(S) WILL DEBAR THE STUDENT FROM AWARD
OF DEGREE/CERTIFICATE, IF FOUND AT ANY STAGE.
2. SUBMITTING ASSIGNMENT(S) BORROWED OR STOLEN FROM
OTHER(S) AS ONE’S OWN WILL BE PENALIZED AS DEFINED IN
“AIOU PLAGIARISM POLICY”.

Course: Database-II (3467) Semester: Autumn 2020


Level: Bachelor (BS (CS) Total Marks: 100
Pass Marks: 50
ASSIGNMENT No. 1
(Units: 1–4)

Note: All questions are compulsory. All carry equal marks.


Q. 1 Explain relational data model with examples. Explain that why it is preferred
over hierarchical and network data models. (20)

Q. 2 Differentiate the following with suitable examples: (20)


a) Optimistic Approach & Pessimistic Approach of Concurrency Control
b) Simple Normal Forms & Higher Normal Forms
c) Insertion Rule & Deletion Rule
d) System Privilege & Object Privilege

Q. 3 (20)
a) What conditions would make a 3NF relation violate Boyce-Codd Normal
Form (BCNF)?
b) Discuss the purpose of Boyce–Codd Normal Form (BCNF) and discuss how
BCNF differs from 3NF. Provide an example to illustrate your answer.

Q. 4 Suppose you are designing database of students result management system for BS
(CS). Develop sample tables and apply normalization on it and also describe that to
which level of normalization is applied. (20)

Q. 5 (20)
a) What is deadlock? How deadlocks can be detected and prevented? Also
explain the modules for concurrency control.
b) Discuss database integrity with the help of examples.
ASSIGNMENT No. 2
(Units: 5–8)
Total Marks: 100
Pass Marks: 50

Note: All questions are compulsory. All carry equal marks.

Q. 1 (20)
a) Explain the purpose and scope of database security with real life examples.
b) Describe important reasons of database failure. Also explain database
recovery methods.
Q. 2 (20)
a) The scope of database security extends beyond just DBMS controls. Discuss
the role of the database administrator in database security and recovery.
b) Write an algorithm that checks whether the concurrently executing
transactions are in deadlock.

Q. 3 (20)
a) The consistency and reliability aspects of transactions are due to the
“ACIDity” properties of transactions. Discuss each of these properties and
how they relate to the concurrency control and recovery mechanisms. Give
examples to illustrate your answer.
b) Explain the concepts of serial, non-serial and serializable schedules. State the
rules for equivalence of schedules.

Q. 4 (20)
a) Describe the features of a distributed database management system
(DDBMS).
b) One problem area with DDBMSs is that of distributed database design.
Discuss the issues that have to be addressed with distributed database design.
Discuss how these issues apply to the global system catalog.

Q. 5 (20)
a) Compare and contrast the different definitions of object-oriented data models.
b) What is pointer swizzling? Describe the different approaches to pointer
swizzling.

======

You might also like