0% found this document useful (0 votes)
11 views

Be Computer Engineering Semester 5 2023 November Database Management Systems Dms Pattern 2019

Uploaded by

shadowflash0508
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Be Computer Engineering Semester 5 2023 November Database Management Systems Dms Pattern 2019

Uploaded by

shadowflash0508
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 8] SEAT No.

8
23
P-7537 [Total No. of Pages : 2

ic-
[6180]-45

tat
3s
T.E. (Computer Engg./Artificial Intelligence & Data Science)

4:5
02 91
DATABASE MANAGEMENT SYSTEM

9:4
0
(2019 Pattern) (Semester - I) (310241)

30
9/1 13
0
Time : 2½ Hours] [Max. Marks : 70
1/2
.23 GP

Instructions to the candidates:


1) Answer Q. 1 or Q. 2, Q. 3 orQ. 4, Q. 5or Q. 6, Q.7 or Q.8.
E
82

8
C

23
2) Neat diagrams must be drawn wherever necessary.

ic-
3) Figures to the right indicate full marks.
16

tat
4) Assume suitable data, if necessary.
8.2

3s
.24

4:5
91
49

Q1) a) What is anomaly in relational model. Explain how normalization can


9:4
30

be used to reduce the anomalies. [9]


30
01
02

b) Explain 2NF and 3NF and BCNF with example. [9]


1/2
GP

OR
9/1
CE
82

Q2) a) What are relational integrity constraints. Explain with example Domain

8
23
constraints, Referential-Integrity and enterprise constraints. [9]
.23

ic-
16

tat
b) Elaborate the significance of codd’s rule. Explain 12 rules proposed
8.2

3s

by codd’s. [9]
.24

4:5
91
49

9:4
30

Q3) a) Explain the concept of conflict serializability with suitable example.


30

Since every conflict-serializable schedule is view serializable, why do


01
02

we emphasize conflict serializability rather than view serializability?


1/2
GP

[9]
9/1
CE

b) Explain the two-phase lock protocol for concurrency control. Also


82

explain its two versions: strict two-phase lock protocol and rigorous
.23

two-phase lock protocol. [8]


16
8.2

OR
.24
49

P.T.O.
Q4) a) What is R-timestamp(Q) and W-timestamp(Q) Explain the necessary

8
condition used by time stamp ordering protocol to execute for a read /

23
write operation. [8]

ic-
tat
b) To ensure atomicity despite failures we use Recovery Methods Explain

3s
in detail following Log-Based Recovery methods with example. [9]

4:5
02 91
i) Deferred Database Modifications

9:4
ii) Immediate Database Modifications

0
30
9/1 13
0
1/2
Q5) a) Compare SQL and NOSQL Database. [6]
.23 GP

b) Explain BASE Properties of NOSQL Database. [6]


E
82

8
C

c) Explain Document Based and Key value data model of NOSQL

23
Database. [6]

ic-
16

tat
OR
8.2

3s
Q6) a) Explain the CRUD operations used in MongoDB with example. [6]
.24

4:5
91
49

b) State and Explain CAP Theorem. [6]


9:4
30
30

c) Explain Map Reduce with example. [6]


01
02
1/2
GP

Q7) a) What are spatial data. Explain Geographic and Geometric data. [8]
9/1

b) What is the significance of XML databases? Explain with proper


CE
82

8
23
example when to use XML database. [9]
.23

OR ic-
16

tat
8.2

Q8) a) Write a short note on complex data types : [8]


3s
.24

4:5

i) Semi-structured data
91
49

9:4

ii) Features of semi-structured data models


30
30

b) What is object relational database system. Explain Table inheritance


01
02

with example. [9]


1/2
GP
9/1


CE
82
.23
16
8.2
.24
49

[6180]-45 2

You might also like