Dbmsass 2
Dbmsass 2
Chapter 5:
1. Discuss the procedure to evaluate an expression in query processing
2. What is query processing? Explain each step involved in query processing with state
diagram.
3. How to measure cost of query? Explain with an example.
4. Explain various steps involved in query processing with functioning of each step
5. List the techniques to obtain the cost of a query and discuss any of them
6. Explain how an expression can be evaluated with the help of materialization and pipeline
approach
7. Write a short note on intrusion detection
8. Explain how an expression can be evaluated with the help of materialization and pipeline
approach.
9. What is meant by term heuristic optimization? Discuss the main heuristics that are applied
during query optimization
10. Explain steps of query processing with the help of a state diagram
11. Explain materialized views
12. Explain typical query processing strategies of DBMS
13. What are different techniques used in query optimization?
14. Discuss the procedure to evaluate an expression in query processing.
15. What are the problems in query optimization?
16. What are the four phases in a typical Query Processing in DBMS
17. Write a PL/SQL program that fetches records of all students and insert record as
students having CPI > 4 in ELIGIBLE table and students having CPI <= 4 in
NOT_ELIGIBLE table from student_master table
18. Let Relation R1(A,B,C) & R 2(C,D,E) have following properties. R1 has 10,000 tuples
& R2 has 15,000 tuples where 20 tuples of R1 on one block and 15 tuples of R2 on one
block. Estimate no. of block access required using each of the following join strategies of
R1 & R2 a) Merge Join b) Hash Join c) Block Nested Loop Join d) Nested Loop Join
Chapter 6:
1. Describe GRANT and REVOKE commands
2. Explain two phase commit protocol with its advantages
3. Describe TCL and DCL commands each with an example.
4. Explain three types of actions to be taken for recovery from deadlock
5. Describe timestamp based locking protocols.
6. Enlist and summarize different transaction states
7. Explain commit, rollback, and save point commands with an example.
8. Describe validation based locking protocols.
9. What is deadlock? Explain different deadlock prevention techniques
10. Explain atomicity, durability, isolation, and consistency preservation properties of a
database transaction.
11. Define transaction. Explain various states of transaction with suitable diagram.
12. Write a note on conflict serializability
13. Explain the Two-Phase lock Protocol and show how it ensures conflict serializability.
Two Phase lock protocol does not ensure freedom from deadlock explain with necessary
example. Also explain its two versions: strict two-phase lock protocol and rigorous two
phase lock protocol.
14. What is log based recovery? Explain immediate database modification technique for
database recovery
15. Define Failure? Explain Log based Recovery (deferred database modification and
immediate database modification)
16. List and explain various issues while transactions are running concurrently in DBMS
17. Explain three types of actions to be taken for recovery from deadlock
18. Explain validation-based protocol with an example.