DBMS Tutorial (AB)
DBMS Tutorial (AB)
Chapter 1
1. Differentiate between data and information. Explain the reasons of overhead cost of using
DBMS in simple and small database.
2. As a database designer of an IT company you are assigned to carry out the task of
designing a database for an application. Now list out the steps that you would take in
setting up a database for that application.
3. Trace the evolution of database system & the needs to use this type of system in the
present context.
4. When not to use the database systems? Write down the disadvantages of DBMS.
5. Define RDMS. Explain the statement “DBA has central control over the database
system’.
6. Compare & contrast DDL, DML and DCL with examples of each.
7. Differentiate between DBMS and file system. Also, mention the case when not to use the
database system.
8. Mention the Role of DBA and explain different types of database users.
9. Explain the 3-tier architecture of database system in brief.
Chapter 2
1. Draw an ER diagram for social networking site. Include suitable four entity sets, multi
valued attribute, component attribute, mapping cardinalities, generalization/specialization
of your own.
2. Explain the distinction among the terms Primary Key, Candidate Key, Super Key and
Foreign Key with example.
3. Define data model. Write down the steps to design logical & physical data model.
4. What do you mean by Data Model? Discuss the importance in terms of security and
accessibility with various kinds of data models.
5. Compare different types of data models.
OR, On the basis of operation performed, distinguish between hierarchical model,
network model & relational model.
6. Draw an ER diagram for the following scenario
A university contains many faculties. The faculties in turn are divided into several
colleges. Each college offers numerous programs and each program contains many
courses. Teachers can teach many different courses and even the same course numerous
times. Courses can also be taught by many teachers. A student is enrolled in only one
program but a program can contain many students. Students can be enrolled in many
courses at the same time and the courses have many students enrolled.
7. Draw a neat ER diagram of Library Database. Assume entities, relations, attributes, Keys
and constraints and state them clearly.
9. Suppose you are given the following requirements for a simple database for the
Employee Management System:
i. An employee may work in up to two departments or may not be assigned to any
department.
ii. Each department must have one and may have up to three phone numbers.
iii. Each department can have anywhere between 1 and 30 employees.
iv. Each phone is used by one, and only one, department.
v. Each phone is assigned to at least one, and may be assigned to up to 30
employees.
vi. Each employee is assigned at least one, but no more than 5 phones.
Construct a clean and concise ER diagram for the database. Clearly indicate the
cardinality mappings.
Chapter 3
1. How does a view differ with relation? Define the role of view in security.
2. Explain the different types of basic operation used in relational algebra.
3. Consider the following relations stud_1 and stud_2
Stud_1
Name Roll_no Marks Roll_no Address
306 Kirtipur
i. What are the steps to compute stud_1 natural join stud_2? Using it, write the result.
ii. Show the name and Roll_no of those students whose marks are less than 86 from relation
stud_1 (Write only relational algebra expression).
iii. Write the result of following in between stud_1 and stud_2 relation:
a) Right outer join
b) Left outer join
4. What do you mean by database schema? Explain different levels of data models used in
database design. (NOTE: Checkout types of data models too)
5. Consider the following schema
employee (E_id*, Name, Street, City)
Works (E_id*, C_id*, Post, Salary)
Company (C_id*, Cname, location)
Chapter 4
10. What does HAVING clause do and what is its relationship with GROUP BY clause?
Explain with examples.
11. Differentiate between SQL and MYSQL. Why access to database from a general purpose
programming language is required? Explain.
12. What is aggregate function? Explain its various types.
13. Explain different types of join in DBMS with an example.
14. What are views in SQL? Explain equi join, natural join, left & right outer join with
examples.
15. Explain views in SQL with suitable example.
16. Compare alter, drop, delete & update statements. How Group by clause differ from
Having Clause? Explain it with suitable example.
17. Write the SQL statements for the following queries by reference of Players_details
relation:
19. Write the SQL statements for the following queries by reference of Hotel_details relation:
Chapter 5
1. What do you mean by integrity constraints? Explain assertion and triggers in SQL with
their syntax.
2. What is referential integrity? Explain with example about functional dependency and
multi valued dependency.
3. Differentiate between normalization and de-normalization. Explain decomposition
including its types.
4. Explain BCNF with suitable example.
5. Explain multi valued dependency and 4NF with suitable example.
6. Define functional dependency. Explain the closure set of functional dependency with
example
7. Briefly explain how to normalize a database from un-normalized form to 1NF, 2NF, 3NF
and 4NF.
8. Define 3NF. Convert the following 2NF relation into 3NF (Consider Name as primary
key).
9. Define constraint. What are the different types of constraints that can be used while
creating a table?
10. What is database anomaly? Explain different types of database anomalies with suitable
examples.
11. Write short notes on:
i. 3.5 NF
ii. Join Dependency
iii. Cascading in referential Integrity
iv. Assertions Vs Triggers
v. 4NF and 5NF
Chapter 6
1. Is it necessary to manage security at OS level if security in database level is already
done? Explain private key cryptosystem.
2. Discuss about the Access control mechanisms and cryptography methods to secure the
database.
3. Why security is needed in database? How security can be granted using view explain?
OR, how does a view differ with relation? Explain the role of view in security.
4. Explain two different parts of access control in detail.
5. Write short notes on:
i. Bell-La Padula
ii. Encryption and decryption
iii. Authorization vs Authentication
6. Compare security & integrity in DBMS.
Chapter 7
1. How equivalence of expressions used in a query optimization. Explain with example.
Also, explain the cost estimation of query Optimization.
2. What is query processing? Explain with diagram describing each step in detail.
3. What is query cost estimation? Explain cost based & heuristic based choice of evaluation
plan for query optimization.
4. What are equivalence rules? How are they related with query optimization?
5. What are equivalence rules? List down the different equivalence rules.
6. Define query optimization. Write down the steps of query optimization.
Chapter 8
1. How the file is organized using hash function and hashing? Explain.
Chapter 9
1. What are the three types of failure? Explain each with example.
2. Justify the statement “Remote backup system is a must in country like Nepal where
natural disasters are common’.
3. Explain two types of recovery techniques.
4. Compare the shadow paging recovery scheme with the log-based recovery schema.
5. What do you mean by deferred modification and immediate modification?
Chapter 10
1. What is conflict serializable? Explain the concept of locking for concurrency control.
2. When the schedule is called serializable? Explain view and conflict serializable with
example.
3. Differentiate between exclusive lock and shared lock.
4. Define Conflict serializability. Explain deadlock & the conditions which prevent it.
5. What is concurrency control? Explain the ACID properties of transaction in detail.
6. Define schedule. Compare conflict serializability with respect to view serializability.
Chapter 11
1. Write short notes on:
i. ORM
ii. Object Oriented DBMS (OODBMS)
iii. Data Mining and data warehouse
2. Compare and Contrast between heterogeneous and homogeneous distributed databases.
3. What are distributed databases? Explain the architecture of distributed database system.