You are on page 1of 2

DBMS IA2-Answer Key

ANSWER ALL QUESTIONS


Identify the at type of locking needed for insert and delete operations.
The exclusive locks are useful in DML operations like INSERT, UPDATE, or DELETE statements. This lock, when imposed on
1.
a transaction, prevents other persons from accessing the locked resources. It means that an exclusive lock can hold only one
transaction on a resource at the same time.
List the four conditions for Deadlock.
The four necessary conditions for a deadlock situation to occur are mutual exclusion, hold and wait, no preemption and circular
2.
set. We can prevent a deadlock by preventing any one of these conditions. There are different ways to detect and recover a system
from deadlock.
Describe replication transparency.
Quick Reference. A distributed system often employs data replication to ensure a fast response from databases and to enable the
3.
system to be resilient to hardware errors. Replication transparency is the term used to describe the fact that the user should be
unaware that data is replicated.
Describe query execution plan.
A query execution plan is a definition of the following:
4. The sequence in which the source tables are accessed. ...
The methods used to extract data from each table. ...
The methods used to compute calculations, and how to filter, aggregate, and sort data from each table.
Tabulate dynamic hashing and static hashing.
Key Factor Static Hashing Dynamic Hashing
Form of Data Fixed-size, non-changing data. Variable-size, changing data.
The resulting Data Bucket is of variable-
5. Result The resulting Data Bucket is of fixed-length.
length.
Bucket Challenge of Bucket overflow can arise often Bucket overflow can occur very late or
Overflow depending upon memory size. doesn’t occur at all.
Complexity Simple Complex
Show raw the storage device hierarchy.

6.

Define a distributed database management system.


A distributed database is a database that consists of two or more files located in different sites either on the same network or on
7.
entirely different networks. Portions of the database are stored in multiple physical locations and processing is distributed among
multiple database nodes.
Define Data warehousing.
a data warehouse, also known as an enterprise data warehouse, is a system used for reporting and data analysis and is considered
8.
a core component of business intelligence. Data warehouses are central repositories of integrated data from one or more disparate
sources.
Explain data mining.
9. Data mining is the process of extracting and discovering patterns in large data sets involving methods at the intersection of
machine learning, statistics, and database systems.
Describe the Relevancy ranking in DBMS.
10. A relevance ranking module assigns ranking scores to results based on its predetermined criteria, such as the frequency of a user's
query terms in the result text. Modules can be combined to produce a complex ranking strategy for a search interface.

ANSWER ALL QUESTIONS


11. (a) Use the different level in RAID technology and explain its Features.
There are 7 levels of RAID schemes. These schemas are as RAID 0, RAID 1, ...., RAID 6.
These levels contain the following characteristics:
 It contains a set of physical disk drives.
 In this technology, the operating system views these separate disks as a single logical disk.
 In this technology, data is distributed across the physical drives of the array.
 Redundancy disk capacity is used to store parity information.
 In case of disk failure, the parity information can be helped to recover the data.
Different RAID Levels
RAID-0 (Stripping)
RAID-1 (Mirroring)
RAID-2 (Bit-Level Stripping with Dedicated Parity)
RAID-3 (Byte-Level Stripping with Dedicated Parity)
RAID-4 (Block-Level Stripping with Dedicated Parity)
RAID-5 (Block-Level Stripping with Distributed Parity)
RAID-6 (Block-Level Stripping with two Parity Bits)
Apply the structure of B+ tree in DBMS and list the characteristics of a B+ tree
B+ Tree Properties
1. The leaves are all at the same height.
(b)
2. There are at least two children in the root.
3. Except for root, each node can have a max of m children and a min of m/2 children.
4. A max of m – 1 keys and a min of m/2 – 1 keys can be stored in each node.
Determine the Access Control Mechanisms and Cryptography Methods to Secure the
Databases.
Database Security means keeping sensitive information safe and prevent the loss of data. Security
of data base is controlled by Database Administrator (DBA).
12. (a)
The following are the main control measures are used to provide security of data in databases:
1. Authentication
2. Access control
3. Inference control
4. Flow control
5. Database Security applying Statistical Method
6. Encryption
Determine the uses of Distributed Database with neat architecture diagram.
Some of the common architectural models are −
(b) Client - Server Architecture for DDBMS
Peer - to - Peer Architecture for DDBMS
Multi - DBMS Architecture

ANSWER ALL QUESTIONS


Use the following protocols for concurrency control: a. Lock based protocols.
Different categories of protocols:
 Lock Based Protocol
 Basic 2-PL
 Conservative 2-PL
13. (a)  Strict 2-PL
 Rigorous 2-PL
 Graph Based Protocol
 Time-Stamp Ordering Protocol
 Multiple Granularity Protocol
 Multi-version Protocol
Solve the Deadlock problems by using deadlock handling in DBMS
Deadlock Detection and Removal
1. Choose the youngest transaction.
(b) 2. Choose the transaction with fewest data items.
3. Choose the transaction that has performed least number of updates.
4. Choose the transaction having least restart overhead.
5. Choose the transaction which is common to two or more cycles.

You might also like