2022 105502

B.Tech. 5th Semester Examination, 2022

Time 03 Hours
Full Marks 70
Instructions:
  • The marks are indicated in the right-hand margin.
  • There are NINE questions in this paper.
  • Attempt FIVE questions in all.
  • Question No. 1 is compulsory.

Q.1 Choose the correct answer of the following (Any seven question only):

Q1.1

Four DML commands are:

a)

create, update, delete, select

b)

insert, update, drop, select

c)

create, alter, delete, select

d)

insert, modify, delete, select

Q1.2

View is a:

a)

temporary table

b)

virtual table

c)

dynamic table

d)

permanent table

Q1.3

The different levels of data abstraction are:

a)

Physical level

b)

Logical level

c)

View level

d)

all of the above

Q1.4

Which of the following is true?

a)

a super-key is always a candidate key.

b)

every 3NF schema is also a BCNF.

c)

generalization is bottom-up approach.

d)

none of these.

Q1.5

What is the purpose of project operation:

a)

It selects certain columns.

b)

It selects certain rows.

c)

It selects certain strings.

d)

It selects certain integers.

Q1.6

The weak entity set does not have sufficient attributes to form.

a)

Primary key

b)

Candidate key

c)

Both (i) and (ii)

d)

Super key

Q1.7

Which normal form is considered adequate for normal relational database design?

a)

2 NF

b)

5 NF

c)

4 NF

d)

3 NF

Q1.8

Which of the following is not a super key in R(V, W, X, Y, Z) with primary key VY?

a)

VXYZ

b)

VWXZ

c)

VWXY

d)

VWXYZ

Q1.9

Consider R (A, B, C, D, E) with following FDs:- $ A \rightarrow B $, $ A \rightarrow C $, $ CD \rightarrow E $, $ B \rightarrow D $, $ E \rightarrow A $ which of the following FDs is not implied by above set?

a)

CDACCD \rightarrow AC

b)

BDCDBD \rightarrow CD

c)

BCCDBC \rightarrow CD

d)

ACBCAC \rightarrow BC

Q1.10

Which of the following is a concurrency control protocol.

a)

Strict 2-phase locking protocol

b)

Timestamp based protocol

c)

Graph based protocol

d)

All of the above

Q.2 Solve both questions :

Q2.1

What is attribute closure $ X^+ $ of a set of attributes X with respect to a set of FDs F? Give the algorithm for commuting $ X^+ $ for X.

Q2.2

Relation R (ABCDEFGH) contains only atomic values for all of its attributes. $ F = \{ CH \rightarrow G, A \rightarrow BC, B \rightarrow CFH, E \rightarrow A, F \rightarrow EG \} $ is a set of functional dependencies (FDs) so that F is exactly the set of FDs that hold for R.
(i) Find all the candidate keys the relation R have?
(ii) Find the highest normal form with justification in which R exist?

Q.3 Solve both questions :

Q3.1

Briefly explain the ACID properties of the transactions to ensure integrity of the data.

Q3.2

Consider the transactions T1, T2 and T3 and schedules S1 and S2 given below:
T1: r1 (X); r1(Z); w1 (X); w1 (Z)
T2: r2 (Y); r2 (Z); w2 (Z)
T3: r3 (Y); r3 (X); w3 (Y)
S1: r1 (X); r3(Y); r3(X); r2 (Y); r2(Z); w3(Y); w2 (Z); r1 (Z); w1(X); w1 (Z).
S2: r1 (X); r3 (Y); r2(Y); r3(X); r1(Z); r2(Z); w3 (Y); w1 (X); w2(Z); w1 (Z).
Determine which of the above schedules are conflict - serializable.

Q.4 Solve both questions :

Q4.1

Explain the reasons for the update, insertion and deletion anomalies.

Q4.2

With example discuss candidate key, super key, primary key and foreign key.

Q.5 Solve both questions :

Q5.1

What are the typical phases of query processing? With a sketch, discuss these phases in high level query processing.

Q5.2

When is the decomposition of relation schema R into two relation schemes X and Y, said to be a loss-less-join decomposition? Why is this property so important? Explain with example.

Q.6 Solve both questions :

Q6.1

Explain the terms partial functional dependency' and 'transitive dependency'. Define 2NF and 3 NF in relation with these terms.

Q6.2

Discuss the concept of generalization, specialization and aggregation.

Q.7 Solve this question :

Q7.1

Consider the following employee database, primary keys are underlined.
Employee (ename, street, city)
Works (ename, cname, salary)
Company (cname, city)
Manages (cname, manager-name)
Write SQL queries to:
(i) Find the names of all the employees who work for XYZ.
(ii) Find all employees who live in the same city as the company for which they work.
(iii) Find all employees who live in the same cities and on the same streets as do their managers.
(iv) Find all employees who earn more than the average salary of all employees of their company.

Q.8 Solve both questions :

Q8.1

Discuss the advantages and disadvantages of using DBMS as compared to a conventional file system.

Q8.2

What is weak entity set? Explain with suitable example. How weak entities are represented as relational schemas.

Q.9 Write short notes on any two of the following:

Q9.1
a)

SQL Injection

b)

Two-phase locking protocol

c)

Object Oriented DBMS

d)

Armstrong's Axioms


2022 V2 105502

B.Tech. 5th Semester Examination, 2022

Time 03 Hours
Full Marks 70
Instructions:
  • The marks are indicated in the right-hand margin.
  • There are NINE questions in this paper.
  • Attempt FIVE questions in all.
  • Question No. 1 is compulsory.

Q.1 Choose the correct answer of the following (Any seven question only):

Q1.1

Four DML commands are:

a)

create, update, delete, select

b)

insert, update, drop, select

c)

create, alter, delete, select

d)

insert, modify, delete, select

Q1.2

View is a:

a)

temporary table

b)

virtual table

c)

dynamic table

d)

permanent table

Q1.3

The different levels of data abstraction are:

a)

Physical level

b)

Logical level

c)

View level

d)

all of the above

Q1.4

Which of the following is true?

a)

a super-key is always a candidate key.

b)

every 3NF schema is also a BCNF.

c)

generalization is bottom-up approach.

d)

none of these.

Q1.5

What is the purpose of project operation:

a)

It selects certain columns.

b)

It selects certain rows.

c)

It selects certain strings.

d)

It selects certain integers.

Q1.6

The weak entity set does not have sufficient attributes to form.

a)

Primary key

b)

Candidate key

c)

Both (i) and (ii)

d)

Super key

Q1.7

Which normal form is considered adequate for normal relational database design?

a)

2 NF

b)

5 NF

c)

4 NF

d)

3 NF

Q1.8

Which of the following is not a super key in R(V, W, X, Y, Z) with primary key VY?

a)

VXYZ

b)

VWXZ

c)

VWXY

d)

VWXYZ

Q1.9

Consider R (A, B, C, D, E) with following FDs:- ABA \rightarrow B, $ A \rightarrow C $, $ CD \rightarrow E ,, B \rightarrow D ,, E \rightarrow A $ which of the following FDs is not implied by above set?

a)

CDACCD \rightarrow AC

b)

BDCDBD \rightarrow CD

c)

BCCDBC \rightarrow CD

d)

ACBCAC \rightarrow BC

Q1.10

Which of the following is a concurrency control protocol.

a)

Strict 2-phase locking protocol

b)

Timestamp based protocol

c)

Graph based protocol

d)

All of the above

Q.2 Solve both questions :

Q2.1

What is attribute closure X+X^+ of a set of attributes X with respect to a set of FDs F? Give the algorithm for commuting X+X^+ for X.

Q2.2

Relation R (ABCDEFGH) contains only atomic values for all of its attributes. $ F = { CH \rightarrow G, A \rightarrow BC, B \rightarrow CFH, E \rightarrow A, F \rightarrow EG } $ is a set of functional dependencies (FDs) so that F is exactly the set of FDs that hold for R.
(i) Find all the candidate keys the relation R have?
(ii) Find the highest normal form with justification in which R exist?

Q.3 Solve both questions :

Q3.1

Briefly explain the ACID properties of the transactions to ensure integrity of the data.

Q3.2

Consider the transactions T1, T2 and T3 and schedules S1 and S2 given below:
T1: r1 (X); r1(Z); w1 (X); w1 (Z)
T2: r2 (Y); r2 (Z); w2 (Z)
T3: r3 (Y); r3 (X); w3 (Y)
S1: r1 (X); r3(Y); r3(X); r2 (Y); r2(Z); w3(Y); w2 (Z); r1 (Z); w1(X); w1 (Z).
S2: r1 (X); r3 (Y); r2(Y); r3(X); r1(Z); r2(Z); w3 (Y); w1 (X); w2(Z); w1 (Z).
Determine which of the above schedules are conflict - serializable.

Q.4 Solve both questions :

Q4.1

Explain the reasons for the update, insertion and deletion anomalies.

Q4.2

With example discuss candidate key, super key, primary key and foreign key.

Q.5 Solve both questions :

Q5.1

What are the typical phases of query processing? With a sketch, discuss these phases in high level query processing.

Q5.2

When is the decomposition of relation schema R into two relation schemes X and Y, said to be a loss-less-join decomposition? Why is this property so important? Explain with example.

Q.6 Solve both questions :

Q6.1

Explain the terms partial functional dependency' and 'transitive dependency'. Define 2NF and 3 NF in relation with these terms.

Q6.2

Discuss the concept of generalization, specialization and aggregation.

Q.7 Solve this question :

Q7.1

Consider the following employee database, primary keys are underlined.
Employee (ename, street, city)
Works (ename, cname, salary)
Company (cname, city)
Manages (cname, manager-name)
Write SQL queries to:
(i) Find the names of all the employees who work for XYZ.
(ii) Find all employees who live in the same city as the company for which they work.
(iii) Find all employees who live in the same cities and on the same streets as do their managers.
(iv) Find all employees who earn more than the average salary of all employees of their company.

Q.8 Solve both questions :

Q8.1

Discuss the advantages and disadvantages of using DBMS as compared to a conventional file system.

Q8.2

What is weak entity set? Explain with suitable example. How weak entities are represented as relational schemas.

Q.9 Write short notes on any two of the following:

Q9.1
  • SQL Injection
  • Two-phase locking protocol
  • Object Oriented DBMS
  • Armstrong's Axioms
a)

SQL Injection

b)

Two-phase locking protocol

c)

Object Oriented DBMS

d)

Armstrong's Axioms


2021 105502

B.Tech Examination, 2021

Time 3 hours
Full Marks 70
Instructions:
  • The marks are indicated in the right-hand margin.
  • There are NINE questions in this paper.
  • Attempt FIVE questions in all.
  • Question No. 1 is compulsory.

Questions

Q1

Choose the correct answer from the following (any seven) :

a)

The relational model feature is that there (i) is no need for primary key data (ii) is much more data independence than some other database models (iii) are explicit relationships among records (iv) are tables with many dimensions

[2 Marks]
b)

Which of the following operations is used if we are interested in only certain columns of a table? (i) PROJECTION (ii) SELECTION (iii) UNION (iv) JOIN

[2 Marks]
c)

Which of the following is the original purpose of SQL? (i) To specify the syntax and semantics of SQL data definition language (ii) To specify the syntax and semantics of SQL manipulation language (iii) To define the data structures (iv) All of the above

[2 Marks]
d)

Which of the following is true? (i) B+ tree allows only the rapid random access (ii) B+ tree allows only the rapid sequential access (iii) B+ tree allows rapid random access as well as rapid sequential access (iv) B+ tree allows rapid random access and slower sequential access

[2 Marks]
e)

Transaction processing is associated with everything below, except (i) conforming an action or triggering a response (ii) producing detailed summary or exception report (iii) recording a business activity (iv) maintaining a data

[2 Marks]
f)

Which of the following is used at the end of the view to reject the tuples which do not satisfy the condition in where clause? (i) With (ii) Check (iii) With check (iv) All of the above

[2 Marks]
g)

Many applications use ______ where two independent factors are used to identify a user. (i) Two-factor authentication (ii) Cross-site request forgery (iii) Cross-site scripting (iv) Cross-site scoring scripting

[2 Marks]
h)

______ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation. (i) OpenID (ii) Single-site system (iii) Security Assertion Markup Language (SAML) (iv) Virtual Private Database (VPD)

[2 Marks]
i)

The Object Query Language is which of the following? (i) Similar to SQL and uses a select-from-where structure (ii) Similar to SQL and uses a select-where structure (iii) Similar to SQL and uses a from-where structure (iv) Not similar to SQL

[2 Marks]
j)

Which join refers to join records from the right table that have no matching key in the left table and are included in the result set? (i) Left outer join (ii) Right outer join (iii) Full outer join (iv) Half outer join

[2 Marks]
[14 Marks]
Q2

a) List five responsibilities of the database manager. For each responsibility, explain the problem that would arise if the responsibility were not discharged. b) Consider a two-dimensional integer array of size name that is to be used in your favourite programming language. Using the array as an example, illustrate the difference (i) between the three levels of data abstraction and (ii) between a schema and instances.

a)

List five responsibilities of the database manager. For each responsibility, explain the problem that would arise if the responsibility were not discharged.

[7 Marks]
b)

Consider a two-dimensional integer array of size name that is to be used in your favourite programming language. Using the array as an example, illustrate the difference (i) between the three levels of data abstraction and (ii) between a schema and instances.

[7 Marks]
[14 Marks]
Q3

Construct an E-R diagram for a car insurance company that has a set of customers, each of whom owns one or more cars. Each car has associated with it zero to any number of recorded accidents.

[14 Marks]
Q4

a) What are DDL and DML? Explain with the help of examples. b) Explain the following operations with the help of examples : (i) Set of intersection operation (ii) Natural join operation (iii) Division operation

a)

What are DDL and DML? Explain with the help of examples.

[7 Marks]
b)

Explain the following operations with the help of examples : (i) Set of intersection operation (ii) Natural join operation (iii) Division operation

[7 Marks]
[14 Marks]
Q5

a) What are the differences between primary index and secondary index? b) How does the remapping of bad sectors by disk controllers affect data retrievals rates?

a)

What are the differences between primary index and secondary index?

[7 Marks]
b)

How does the remapping of bad sectors by disk controllers affect data retrievals rates?

[7 Marks]
[14 Marks]
Q6

Show that the two-phase locking protocol ensures conflict serializability and that transaction can be serialized according to their lock points.

[14 Marks]
Q7

a) Make a list of security concerns for a bank. For each item on your list, state whether this concern relates to physical security, human security, operating-system security or database security. b) Explain web and distributed database with the help of example.

a)

Make a list of security concerns for a bank. For each item on your list, state whether this concern relates to physical security, human security, operating-system security or database security.

[7 Marks]
b)

Explain web and distributed database with the help of example.

[7 Marks]
[14 Marks]
Q8

Consider the following ordering schedule—'S' of transactions: T1 : R(A); T1 : A:=A+5; T1 : commit; T2 : R(B); T2 : B:=B+5; T3 : R(C); T3:C:=C+5; T3 : C:=C+5; T4 : R(A); T4 : A:=A+5; T4 : R(D); T4 : D:=D+5; T4 : commit; T2 : commit; T3 : commit; Let the initial value of A=B=C=D=0. The system follows log-based recovery process of immediate database modification. The assumption is the concurrency control system uses strict 2PL, and all the transactions share a common disk buffer and single log. Explain what happens during the recovery process, if it occurs a failure at 'T2 : commit' statement.

[14 Marks]
Q9

Write a short note on any one of the following : a) SQL injection b) Database recovery

a)

SQL injection

[14 Marks]
b)

Database recovery

[14 Marks]
[14 Marks]

2020 105502

B.Tech 5th Semester Exam., 2020

Time 3 hours
Full Marks 70
Instructions:
  • The marks are indicated in the right-hand margin.
  • There are NINE questions in this paper.
  • Attempt FIVE questions in all.
  • Question No. 1 is compulsory.

Q.1 Choose the correct answer of the following (any seven):

Q1.1

The way a particular application views the data from the database that the application uses is a

a)

module

b)

relational model

c)

schema

d)

subschema

Q1.2

A relational database developer refers to a record as

a)

a criterion

b)

a relation

c)

a tuple

d)

an attribute

Q1.3

Key to represent relationship between tables is called

a)

primary key

b)

secondary key

c)

foreign key

d)

None of the above

Q1.4

It is better to use files than a DBMS when there are

a)

stringent real-time requirements

b)

multiple users wish to access the data

c)

complex relationships among data

d)

All of the above

Q1.5

Which of the following are the five built-in functions provided by SQL?

a)

COUNT, SUM, AVG, MAX, MIN

b)

SUM, AVG, MIN, MAX, MULT

c)

SUM, AVG, MULT, DIV, MIN

d)

SUM, AVG, MIN, MAX, NAME

Q1.6

A B-tree of order 4 and of height 3 will have a maximum of keys.

a)

255

b)

63

c)

127

d)

188

Q1.7

Consider the following action: TRANSACTION..... Commit; ROLLBACK; What does rollback do?

a)

Undoes the transactions before commit

b)

Clears all transactions

c)

Redoes the transactions before commit

d)

No action

Q1.8

Which of the following is used to get back all the transactions back after rollback?

a)

Commit

b)

Rollback

c)

Flashback

d)

Redo

Q1.9

_____ is an attack which forces an end user to execute unwanted actions on a Web application in which he/she is currently authenticated.

a)

Two-factor authentication

b)

Cross-site request forgery

c)

Cross-site scripting

d)

Cross-site scoring scripting

Q1.10

_____ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

a)

OpenID

b)

Single-site System

c)

Security Assertion Markup Language (SAML)

d)

Virtual Private Database (VPD)

Q.2 Solve both questions :

Q2.1

What are the five main functions of a database administrator?

Q2.2

What are four main differences between file-processing system and a DBMS?

Q.3 Solve this question :

Q3.1

Construct an E-R diagram for a university registrar's office. The office maintains data about each class, including the instructor, the enrollment, and the time and place of the class meetings. For each class pair, a grade is recorded. Document all assumptions that you make about the mapping constraints.

Q.4 Solve both questions :

Q4.1

What is the use of relational query language in DBMS? Use the example to explain tuple and domain relational calculus.

Q4.2

Explain the following operations with the help of examples: (i) Generalized projection (ii) Outer join (iii) Aggregate function

Q.5 Solve this question :

Q5.1

Construct the B+ tree for the following set of key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31). Assume that tree is initially empty and values are added in ascending order. Construct B+ tree for the cases where the number of pointers that will fit in one node is as follows: (a) Four (b) Six (c) Eight

Q.6 Solve both questions :

Q6.1

List the ACID properties. Explain the usefulness of each.

Q6.2

What benefit is provided by rigorous two-phase locking? How does it compare with other forms of two-phase locking?

Q.7 Solve both questions :

Q7.1

What is the purpose of having separate categories for index authorization and resource authorization?

Q7.2

Explain the data mining and data warehousing related to DBMS.

Q.8 Solve this question :

Q8.1

Compute the closure (F+) of the following set of functional dependencies for the relational schema (A, B, C, D, E) = R. List the candidate keys for R:
$ A \rightarrow BC $
$ CD \rightarrow E $
$ B \rightarrow D $
$ E \rightarrow A $

Q.9 Write short notes on the following:

Q9.1
a)

RBAC model

b)

Concurrency control


2020 V2 105502

B.Tech 5th Semester Exam., 2020

Time 3 hours
Full Marks 70
Instructions:
  • The marks are indicated in the right-hand margin.
  • There are NINE questions in this paper.
  • Attempt FIVE questions in all.
  • Question No. 1 is compulsory.

Q.1 Choose the correct answer of the following (any seven):

Q1.1

The way a particular application views the data from the database that the application uses is a

a)

module

b)

relational model

c)

schema

d)

subschema

Q1.2

A relational database developer refers to a record as

a)

a criterion

b)

a relation

c)

a tuple

d)

an attribute

Q1.3

Key to represent relationship between tables is called

a)

primary key

b)

secondary key

c)

foreign key

d)

None of the above

Q1.4

It is better to use files than a DBMS when there are

a)

stringent real-time requirements

b)

multiple users wish to access the data

c)

complex relationships among data

d)

All of the above

Q1.5

Which of the following are the five built-in functions provided by SQL?

a)

COUNT, SUM, AVG, MAX, MIN

b)

SUM, AVG, MIN, MAX, MULT

c)

SUM, AVG, MULT, DIV, MIN

d)

SUM, AVG, MIN, MAX, NAME

Q1.6

A B-tree of order 4 and of height 3 will have a maximum of keys.

a)

255

b)

63

c)

127

d)

188

Q1.7

Consider the following action: TRANSACTION..... Commit; ROLLBACK; What does rollback do?

a)

Undoes the transactions before commit

b)

Clears all transactions

c)

Redoes the transactions before commit

d)

No action

Q1.8

Which of the following is used to get back all the transactions back after rollback?

a)

Commit

b)

Rollback

c)

Flashback

d)

Redo

Q1.9

_____ is an attack which forces an end user to execute unwanted actions on a Web application in which he/she is currently authenticated.

a)

Two-factor authentication

b)

Cross-site request forgery

c)

Cross-site scripting

d)

Cross-site scoring scripting

Q1.10

_____ allows a system administrator to associate a function with a relation; the function returns a predicate that must be added to any query that uses the relation.

a)

OpenID

b)

Single-site System

c)

Security Assertion Markup Language (SAML)

d)

Virtual Private Database (VPD)

Q.2 Solve both questions :

Q2.1

What are the five main functions of a database administrator?

Q2.2

What are four main differences between file-processing system and a DBMS?

Q.3 Solve this question :

Q3.1

Construct an E-R diagram for a university registrar's office. The office maintains data about each class, including the instructor, the enrollment, and the time and place of the class meetings. For each class pair, a grade is recorded. Document all assumptions that you make about the mapping constraints.

Q.4 Solve both questions :

Q4.1

What is the use of relational query language in DBMS? Use the example to explain tuple and domain relational calculus.

Q4.2

Explain the following operations with the help of examples: (i) Generalized projection (ii) Outer join (iii) Aggregate function

Q.5 Solve this question :

Q5.1

Construct the B+ tree for the following set of key values: (2, 3, 5, 7, 11, 17, 19, 23, 29, 31). Assume that tree is initially empty and values are added in ascending order. Construct B+ tree for the cases where the number of pointers that will fit in one node is as follows: (a) Four (b) Six (c) Eight

Q.6 Solve both questions :

Q6.1

List the ACID properties. Explain the usefulness of each.

Q6.2

What benefit is provided by rigorous two-phase locking? How does it compare with other forms of two-phase locking?

Q.7 Solve both questions :

Q7.1

What is the purpose of having separate categories for index authorization and resource authorization?

Q7.2

Explain the data mining and data warehousing related to DBMS.

Q.8 Solve this question :

Q8.1

Compute the closure (F+) of the following set of functional dependencies for the relational schema (A, B, C, D, E) = R. List the candidate keys for R:
$ A \rightarrow BC $
$ CD \rightarrow E $
$ B \rightarrow D $
EAE \rightarrow A

Q.9 Write short notes on the following:

Q9.1
  • RBAC model
  • Concurrency control
a)

RBAC model

b)

Concurrency control


Install on iOS

To install BEU Connect on your iPhone:

1. Tap the Share button at the bottom of Safari.
2. Scroll down and tap "Add to Home Screen".