Final DBMS MID2 Question Bank 30.4.2025
Final DBMS MID2 Question Bank 30.4.2025
UNIT-3 PART-A
Q.No ShortAnswerQuestions
UNIT-3 PART-B
Q.No DescriptiveQuestions
A List all Relational Set operators with it’s description and Syntax.
1 Explain how to create tables with relationships between
B
them.
2 A Discuss the difference between a LEFT JOIN and a RIGHT JOIN? Explain
with an example
Write short note on EXCEPT condition
B
A Explain different types of views with an example.
3 What is Union and intersect operation on two data sets.Explain.
B
A Write a short note on Aggregate functions of SQL
4
B Write a short note on Updated Views in SQL
A Explain about sub queries with an example.
5
Q.No ShortAnswerQuestions
Expand BCNF
1
2 What is a Functional Dependency
What is a Closure explain with an Example
3
What is the Rule for 2 nd Normal Form
4
5 What is Transitive Dependency
6 What is a Surrogate Key
7 State the Rule of First Normal Form
8 List the advantages of Normalization
9 Differentiate between Prime and Non Prime attribute.
10 What is MVD?
UNIT-4 PART-B
Q.No DescriptiveQuestions
A State and explain Third normal form with an example
1 Describe loss less join property of Schema Decomposition
B
Define BCNF. How does BCNF differ from 3NF? Explain with an
A example
2
Discuss in detail about all the Functional Dependencies with appropriate
B
examples
A State and explain First normal form with an example
3
B Explain about dependency preserving decomposition with an example.
A State and explain Second normal form with an example
4
B Explain different types of FD’S.
A Describe Multi Valued Functional Dependency with an example.
5
B Explain the concept of Surrogate Key in detail.
A Consider schema R = (A, B, C, G, H, I) and the set F of functional
6 dependencies {A → B, A → C, CG → H, CG → I, B → H}. Compute
the closure and Compute the Candidate keys of the schema.
What is decomposition?List the properties of decomposition.
B
A Discuss Fourth Normal Form by taking a Suitable example
7 Discuss about Lossy Decomposition in detail.
B
A Distinguish between 1NF and 2 NF With Examples.
8
B Explain BCNF in detail with example.
A Explain the closure concept with an example in detail.
9
B Differentiate between FD and MVD.
A What is Normalization?Explain different types of normal forms.
10
B Distinguish between between lossy and lossless join decomposition.
UNIT-5 PART-A
Q.No ShortAnswerQuestions
1 Define Transaction.
2 What is Atomicity
3 What is Consistency
4 What is Isolation
5 Distinguish Shared Lock and Exclusive Lock
6 Write about recovery facilities in transaction management
7 Discuss Validation Phase
8 List all Lock Based Protocols
9 What is Dirty Read in concurrent execution
10 Write about wound wait scheme in transaction management.
UNIT-5 PART-B
Q.No DescriptiveQuestions
A Explain about transaction states with an example.
1 Discuss Timestamp- based protocols?
B
What are ACID properties? Illustrate them through examples and also
A explain commit and Rollback
2
Explain the concept of deadlock and dead lock prevention policies with
B
an example.
A Explain about Conflict Serializability with an example.
3
B Explain Concurrency control protocols.
A Discuss about View Serializability.
4
B Distinguish Shared Lock and Exclusive Lock with examples.
A Define concurrent execution? Explain about problems with concurrent
5 execution
B Explain B+Tree concept with an example in detail.
A Discuss in detail about all Lock Based Protocols
6 Explain about Hash based indexing techniques with an example.
B
A Describe Optimistic Protocols
7 Construct a B+Tree for the following list of elements: 1, 4, 7, 10, 17, 21,
B
31, 25, 19, 20, 28, 42. Assume the initial tree is empty and a node can
hold maximum 3 key values.
A Explain the concept of deadlock and dead lock prevention policies with
8 an example.
B Discuss Serializabilty concept with example in detail.
A Define locking protocol. Describe the Strict Two-Phase Locking protocol
9 with an example.
B Distinguish between Conflict and View serializability.
A Explain about Two-Phase looking protocol.
10
B Explain about Log based recovery with an example.