Escolar Documentos
Profissional Documentos
Cultura Documentos
1) The ability to change the conceptual schema without affecting the external schema or
application programs is known as __________.
a) Program-data independence
b) Logical-data independence
c) Physical data independence
d) Data abstraction
2) Which of these attributes can be considered as the identifying attribute for an entity student?
a) Address
b) Roll number
c) Marks
d) Any of these
4) Which of the following operation requires two tables as input and the two tables must have
one common column?
a) Join
b) Division
c) Cartesian product
d) Projection
5) Which of these mechanisms provides a way to retrieve multiple tuples from a relation and
then process each tuple individually in a host program?
a) Triggers
b) Cursors
c) Assertions
d) None of these
6) A relation in which every non-key attribute is fully functional dependent on the primary key
and which has no transitive dependencies is said to be in ___________.
a) 3NF
b) 2NF
c) BCNF
d) 4NF
7) An index created by query optimizer and destroyed when the query is completed is known as
__________.
a) Secondary index
b) Optimized index
c) Temporary index
d) Permanent index
8) Which of these operations is considered for the purpose of recovery and concurrency control?
a) Write
b) Commit
c) Abort
d) All of these
9) The remote site at which the database backup is taken is known as _____________.
a) Primary site
b) Secondary site
c) Tertiary site
d) None of these
10) The OLTP systems use ___________ schemas to optimize query performance.
a) Denormalized
b) Fully normalized
c) Partially normalized
d) None of these
Section B
Answer ANY THREE questions in this section. This section carries 90 marks.
a) The following table contains two Transactions, Trans1 and Trans2 which run
concurrently:
T1 T2
Lock X(R) - ..
Lock S(Q)
.
Lock S(R)
Lock X(Q)
Determine whether deadlock will occur in above concurrent transactions and describe the
various approaches to prevent the deadlock.
(12 marks)
Describe various types of log records & types of log entry that are maintained by recovery
manager in system log during normal execution of above transactions to recover it in the
event of failure.
(15 marks)
c) Explain the intuition behind the two rules in the Bell-LaPadula model for mandatory
access control.
(5 marks)
Consider Online book database that contain following relational database schema
Book(ISBN,Book_title,Category,Price,Copyright_date,Year,Page_count,P_ID)
Publisher(P_ID,Pname,Address,State,Phone,Email_id)
Author(A_ID,Aname,City,State,Zip,Phone,Url)
Author_Book(A_ID,ISBN)
Review(R_ID,ISBN,Rating)
Hint : Underlined attributes are primary keys.
a) Draw the initial query tree for each of these expressions and derive their optimized query
tree after applying heuristics on them.
a) Consider the database of the company to be stored at multiple sites, Explain the
methods of storing company data in distributed database systems.
(16 marks)
b) A Health care consultant offers a different type of health related services to patient.
They are looking into the possibility of investigating in data mining applications and
but is unsure of the potential benefits and issues brought about by such application.
(Assume that the consultant has four health care branches) The consultant has yet to
have a data warehouse; a project which was initiated by a team of research students
but this data is yet to be put into good use.
The health care consultant has requested your expertise as an IT consultant to shed
some light in this area. Your presentation to the management of the consultant should
address the following aspects:
(i) Explain FOUR (4) reasons why the health care consultant needs data mining
application.
(8 marks)
(ii) Briefly discuss ANY THREE (3) applications of data mining which would
benefit the health care consultant.
(6 marks)