Professional Documents
Culture Documents
Q. 3 (20)
a) What conditions would make a 3NF relation violate Boyce-Codd Normal
Form (BCNF)?
b) Discuss the purpose of Boyce–Codd Normal Form (BCNF) and discuss how
BCNF differs from 3NF. Provide an example to illustrate your answer.
Q. 4 Suppose you are designing database of students result management system for BS
(CS). Develop sample tables and apply normalization on it and also describe that to
which level of normalization is applied. (20)
Q. 5 (20)
a) What is deadlock? How deadlocks can be detected and prevented? Also
explain the modules for concurrency control.
b) Discuss database integrity with the help of examples.
ASSIGNMENT No. 2
(Units: 5–8)
Total Marks: 100
Pass Marks: 50
Q. 1 (20)
a) Explain the purpose and scope of database security with real life examples.
b) Describe important reasons of database failure. Also explain database
recovery methods.
Q. 2 (20)
a) The scope of database security extends beyond just DBMS controls. Discuss
the role of the database administrator in database security and recovery.
b) Write an algorithm that checks whether the concurrently executing
transactions are in deadlock.
Q. 3 (20)
a) The consistency and reliability aspects of transactions are due to the
“ACIDity” properties of transactions. Discuss each of these properties and
how they relate to the concurrency control and recovery mechanisms. Give
examples to illustrate your answer.
b) Explain the concepts of serial, non-serial and serializable schedules. State the
rules for equivalence of schedules.
Q. 4 (20)
a) Describe the features of a distributed database management system
(DDBMS).
b) One problem area with DDBMSs is that of distributed database design.
Discuss the issues that have to be addressed with distributed database design.
Discuss how these issues apply to the global system catalog.
Q. 5 (20)
a) Compare and contrast the different definitions of object-oriented data models.
b) What is pointer swizzling? Describe the different approaches to pointer
swizzling.
======