DBMS Iat 2 QB
DBMS Iat 2 QB
Discuss in detail the various types of anomalies that can occur in a poorly designed
database, providing examples for each.
2. Explain 1NF and 2NF with example.
3. Explain Normalization process in Detail
4. Explain 2NF with Example.
5. Explain 3NF with Example.
6. Explain BCNF with Example
7. Explain 2NF and 3NF with Example.
8. Illustrate with examples the importance of functional dependency in relational
database design.
9. How does decomposition help in improving database design? Discuss with
examples.
10. Explain Decomposition and its types in detail.
11. Explain Lossless Decomposition in detail with example
12. Explain Lossy Decompostion in detail with example
13. Explain the stages involved in query parsing and how they contribute to query
processing.
14. Explain the process of query execution, focusing on the translation from logical to
physical operators.
15. Describe how query cost is estimated during query optimization.
16. Explain the selection operation in query processing and how it is optimized using
indexes.
17. What techniques can be used to minimize the cost of sorting large datasets during
query execution?
18. Discuss how join operations are optimized in query processing. What techniques are
commonly used?
19. Describe the role of join commutativity and associativity in transforming relational
expressions for query optimization
20. Explain the concept of transformation rules in query optimization and how they
improve query performance.
21. Explain how cardinality and selectivity are estimated during query processing and
why these estimates are crucial for optimization.
22. Describe how inaccurate statistics can affect the performance of a query execution
plan. Provide examples.
23. Discuss the steps involved in choosing an evaluation plan for query processing.
24. How can selection predicates be reordered for query optimization? Provide
examples.
25. Explain ACID properties in details with example.
26. Explain different Transaction States
27. What are the challenges in ensuring the ACID properties in distributed database
systems?
28. Explain Conflict and View Serializability in detail
29. Explain the concept of Grant and Revoke in SQL with example
30. Describe the different types of lock-based protocols used to ensure serializability.
31. Discuss how the insertion-deletion operations are handled in a database transaction
system while maintaining the ACID properties.
32. What are predicate reads in the context of database transactions?
33. Describe the hierarchical locking protocol used in multiple granularity locking.
34. Explain the working of timestamp-based protocols in database concurrency contro
35. Compare and contrast timestamp-based and validation-based protocols.
36. What is log-based recovery in databases? Discuss the role of logs in ensuring data
consistency and recovery after a system crash.