CB3401 DBMSS
CB3401 DBMSS
QUESTION BANK
R-2021
Prepared by
Mrs. T. Sathiya Priya Page 1
DEPARTMENT OF CSE (CYBER SECURITY)
II YEAR / IV SEMESTER
REGULATION - 2021
Prepared by
Mrs. T. Sathiya Priya Page 2
INSTITUTE VISION & MISSION
VISION:
To become a globally recognized “Centre of Academic Excellence” providing Quality
Education to all students.
MISSION:
To provide Quality Education in the fields of Engineering, Management, Information,
Technology and other Engineering areas.
VISION:
To develop eminent engineers, researchers and entrepreneurs in the areas of Computer Science
& Engineering and Cyber Security with exceptional technical expertise, skills and ethical values,
capable of providing innovative solutions to national and global needs.
MISSION:
M1 : To create a study environment where all academicians, entrepreneurs, researchers are
brought together.
M2 : To create perpetual learning environment for students and faculty members establish
research centre and conduct researches in emerging areas.
M3 : To create a platform for socially relevant technical and domain researches through funded
projects.
Prepared by
Mrs. T. Sathiya Priya Page 3
PROGRAM EDUCATIONAL OBJECTIVES (PEOs)
Apply their technical competence in computer science to solve real world problems,
PEO1
with technical and people leadership.
PEO2 Conduct cutting edge research and develop solutions on problems of social relevance.
Ethics: Apply ethical principles and commit to professional ethics and Responsibilities and
PO8
norms of the engineering practice.
Prepared by
Mrs. T. Sathiya Priya Page 4
Individual and team work: Function effectively as an individual, and as a member or leader
PO9
in Diverse teams, and in multidisciplinary settings.
Life-long learning: Recognize the need for, and have the preparation and ability to Engage
PO12 in independent and life-long learning in the broadest context of technological change.
PSO1 Exhibit design and programming skills to build and automate business solutions using
cutting edge technologies.
PSO2 Strong theoretical foundation leading to excellence and excitement towards research,
to provide elegant solutions to complex problems.
Prepared by
Mrs. T. Sathiya Priya Page 5
CB3401 DATABASE MANAGEMENT SYSTEMS AND SECURITY
L T P C
3 0 0 3
COURSE OBJECTIVES:
To learn the fundamentals of data models, conceptualize and depict a database system
using ER diagram. To study the principles to be followed to create an effective relational
database and write SQL queries to store/retrieve data to/from database systems. To know the
fundamental concepts of transaction processing, concurrency control techniques and recovery
procedure. To understand the need of security in Database Management system. To learn how
to secure database Management systems.
TOTAL: 45 PERIODS
Prepared by
Mrs. T. Sathiya Priya Page 6
COURSE OUTCOMES
PO’s PSO’s
CO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2
1 1 2 2 1 1 - 1 - 2 - 2 2 3 2
2 1 2 2 1 1 - 1 - 2 - 3 2 3 3
3 2 1 2 1 2 - 2 - 1 - 3 3 3 3
4 2 2 3 2 1 - 2 - 2 - 3 2 3 3
5 2 2 3 2 2 - 1 - 2 2 3 3 3 3
AVg. 2 2 2 1 1 - 1 - 2 2 3 2 3 3
Prepared by
Mrs. T. Sathiya Priya Page 7
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, “Database System
Concepts”, Seventh Edition, Tata McGraw Hill, 2021.
2. Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database
Systems”, Seventh Edition, Pearson Education, 2016.
3. William Stallings, Lawrie Brown, “Computer Security: Principles and
Practice”, Fourth Edition, Pearson, 2019.
REFERENCES:
1. C.J. Date, A. Kannan and S. Swamynathan, “An Introduction to Database
Systems”, Pearson Education, Eighth Edition, 2006.
2. Raghu Ramakrishnan and Johannes Gehrke, “Database Management
Systems”, Third Edition, McGraw Hill, 2014.
3. Narain Gehani and Melliyal Annamalai, “The Database Book: Principles and
Practice Using the Oracle Database System”, Universities Press, 2012.
Prepared by
Mrs. T. Sathiya Priya Page 8
UNIT I
RELATIONAL DATABASES
PART–A
CO
Q. No Questions BT Level Complexity
Mapping
Prepared by
Mrs. T. Sathiya Priya Page 9
What is the role of replication in fault
18 CO1 Understand Low
tolerance?
PART–B
CO
Q. No Questions BT Level Complexity
Mapping
2 Discuss all the Data Models with examples. CO1 Understand Medium
Prepared by
Mrs. T. Sathiya Priya Page 10
What is data fragmentation? Explain its types
9 with suitable examples. CO1 Understand Medium
Prepared by
Mrs. T. Sathiya Priya Page 11
Create the following table with the relations:
EMPLOYEE
GEN DCO
ENO NAME DOB
DER DE
HAME 24-MAR-
12345 M 201
N 2001
12-MAR-
12346 VINI F 202
2001
II-JAN-
1234'7 ANI F
1999
14-FEB-
12348 PETER M
2001
DEPARTMENT
13 DCODE DNAME CO1 Create High
COMPUTER
201
SC
202 INFN SC
203 CIVIL
204 MECHANICAL
Prepared by
Mrs. T. Sathiya Priya Page 12
UNIT II
DATABASE DESIGN
PART–A
CO
Q. No Questions BT Level Complexity
Mapping
Prepared by
Mrs. T. Sathiya Priya Page 13
18 What is a candidate key? CO3 Understand Low
PART–B
CO
Q. No Questions BT Level Complexity
Mapping
1 Explain ER modeling with an example. CO1 Understand Medium
Prepared by
Mrs. T. Sathiya Priya Page 14
How do functional dependencies impact
5 CO3 Understand High
normalization?
9 Explain the steps to convert a relation into 3NF. CO3 Understand Medium
Prepared by
Mrs. T. Sathiya Priya Page 15
UNIT – III
TRANSACTION MANAGEMENT
PART–A
CO
Q.No Questions BT Level Complexity
Mapping
Prepared by
Mrs. T. Sathiya Priya Page 16
What is the difference between shared and
17 CO4 Understand Medium
exclusive locks?
PART–B
Prepared by
Mrs. T. Sathiya Priya Page 17
Explain strict two-phase locking (Strict 2PL) with
13 CO4 Understand Medium
an example.
Prepared by
Mrs. T. Sathiya Priya Page 18
UNIT IV
DATABASE SECURITY
PART–A
CO
Q. No Questions BT Level Complexity
Mapping
4 What is the basic technique behind SQL Injection? CO5 Understand Low
5 What are common entry points for SQLi attacks? CO5 Understand Low
Prepared by
Mrs. T. Sathiya Priya Page 19
Difference between encryption at rest and
17 CO5 Understand Low
encryption in transit?
PART–B
CO
Q. No Questions BT Level Complexity
Mapping
Prepared by
Mrs. T. Sathiya Priya Page 20
How does improper error handling lead to SQL
13 CO5 Understand High
Injection?
Prepared by
Mrs. T. Sathiya Priya Page 21
UNIT – V
ACCESS CONTROL AND ENCRYPTION
PART–A
CO
Q. No Questions BT Level Complexity
Mapping
Prepared by
Mrs. T. Sathiya Priya Page 22
16 What is transitive authorization in databases? CO5 Understand Low
PART – B
CO
Q. No Questions BT Level Complexity
Mapping
Explain the importance of access control in
1 CO5 Understand Medium
database security.
Compare DAC (Discretionary Access Control)
2 CO5 Evaluate Medium
and MAC (Mandatory Access Control).
Prepared by
Mrs. T. Sathiya Priya Page 23
Discuss different methods to control inference
8 CO5 Understand Medium
attacks in databases.
Explain different types of database encryption
9 CO5 Understand Medium
techniques.
Compare Encryption at Rest, Encryption in
10 CO5 Evaluate Medium
Transit and End-to-End Encryption.
Explain discretionary vs. mandatory access
11 CO5 Understand Medium
control with examples.
Prepared by
Mrs. T. Sathiya Priya Page 24
THANK YOU
Prepared by
Mrs. T. Sathiya Priya Page 25