You are on page 1of 2

Mailam Engineering College

Mailam, Villupuram (Dt.) Pin: 604 304


(Approved by AICTE, New Delhi, Affiliated to Anna University, Chennai
& Accredited by TCS, New Delhi)
DEPARTMENT OF INFORMATION TECHNOLOGY

INTERNAL ASSESSMENT TEST-II

Sub. Code/Sub.: CS8492 / Database Management System Date:25.02.19


Dept : II-IT SEM : IV Time: 3 hrs

Part –A 10*2=20
1. Define lock? What are the different modes of lock? (April/May- 2015, 2018)
2. Define deadlock? (May 2008)
3. Differentiate strict two-phase locking protocol and rigorous two
phase locking protocol. (May 2016)
4. List down the SQL facilities for concurrency. (MAY-2012)
5. What benefit does strict two-phase locking provide? What are the disadvantages?
(May-2007/2012)
6. List the two commonly used Concurrency Control techniques.
(NOV-2011)
7. List the SQL statements used for transaction control (NOV–2011)
8. What are two pitfalls (problems) of lock-based protocols? (MAY-2011)
9. Brief about cascading rollback. (DEC-2013)
10.What type of locking needed for insert and delete operation.
(MAY 2017)

Part –B 5*13=65
11.a) i) Explain the four important properties of transaction that a DBMS
must ensure to maintain database . MAY-2007 (6)
ii) Explain the various transaction states and models?(Or)
With a neat sketch discuss the states a transaction can be in Nov-2011
(7)
(or)
b) i) Explain the implementation of atomicity and durability with shadow
copy scheme? (Or)How can you implement atomicity in transactions?
Explain.MAY-2010 (Nov/Dec-17) (5)
ii) What is system recovery? Discuss the different failures which arise in
it? Discuss in detail about System Recovery. DEC-2010 (8)
12.a) Explain 2 phase locking protocol& it types in detail? Discuss two phase
locking protocol. Give relevant example. NOV-2011,2016 (13)
(Or)
b) Explain the concept of serializability in detail? Explain the different forms
of serializability. Explain testing for serializability with respect to
concurrency control schemes. NOV-2006 (13)

13. a) Describe the concept of serilalizability with suitable example.


MAY-2010 (13)
(or)
b) What is a lock based protocol. Explain the various types of lock and how
it will be granted to other users? (13)
14. a) What is a lock based protocol. Explain the various types of lock and how it
will be granted to other users?Dec-2010 (13)
(or)
b) Discuss the 3 concurrency problems in detail? State and explain the three
concurrency problems. DEC-2010 (13)
15. a) What is deadlock? Explain how it can be handled and prevented?
Describe about the deadlock prevention schemes. MAY-2011 (13)
(Or)
b) State the Two-Phase Commit protocol. Discuss the implications of a
failure of the coordinator and some participants. DEC-2010 (13)

Part –C 1*15=15
16.What is RAID? Briefly explain different levels of RAID. Discuss the
actors to be considered in choosing a RAID level and How does it improve
performance and reliability. DEC-2013

Prepared By: Verified By: Approved By:


K.Loganathan, P.Saravanan Dr.M.Ramalingam,
AP/IT ASP/IT HOD/IT

You might also like