Code No: 823AC R15
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
--- Content provided by FirstRanker.com ---
MCA III Semester Examinations, April/May - 2019
DATABASE MANAGEMENT SYSTEMS
Time: 3hrs Max.Marks:75
Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.
--- Content provided by FirstRanker.com ---
PART - A 5 x 5 Marks =25
- Is data model mandatory for a database management system? Justify your answer. [5]
- What is an active database? Give its applications. [5]
- State the Armstrong’s axioms for functional dependencies. [5]
- Differentiate between wound-wait and wait-die policies. [5]
- Compare hash file organization with heap file organization. [5]
--- Content provided by FirstRanker.com ---
PART -B 5 x 10 Marks =50
- a) Describe the database management systems architecture with suitable diagram. [10]
OR
b) What is a weak entity set? How to represent it in ER diagram? What constraints to be followed for it?--- Content provided by FirstRanker.com ---
Quote examples for composite attribute, derived attribute, partial participation. [5+5] - a) Consider the following schema to write queries in relational algebra:
EMP(eid, ename, ecity)
PROJECT(pno, pname, duration)
Assign(eid, pno, number of hours per week)--- Content provided by FirstRanker.com ---
Find the names of the employees working for ‘stegnography’ project.
Find the names of the projects having the employee ‘Niranjan Gupta’
Find the total effort by the employees per week by the employees from ‘Warangal’. [10]
OR
b) Differentiate between nested query and correlated query.--- Content provided by FirstRanker.com ---
How does group by clause executed in SQL? [5+5] - a) What are the problems caused by redundancy? Explain mechanisms to address these problems. [10]
OR
b) Why is Boyce-Codd normal form is known as new-third normal form?
With an example explain multi valued dependencies. [5+5] - a) How does two phase locking protocol ensure conflict serializability? Explain with examples. [10]
OR
b) What is the usage of write ahead log protocol?
Depict the significance of Check pointing. [5+5] - a) Define track, cylinder, rotational delay.
--- Content provided by FirstRanker.com ---
Contrast sparse with dense index. [5+5]
OR
b) Construct an extendible hashing index structure for the following records (key *).
Consider a bucket can hold only 3 records. Depict global and local depths at every stage of construction. [10]
[4* [8* [16* [24* [32% [ 5% [9* [12% [ 15% [3* | 10* [ 40* [ 48* | 7* [ 20* |
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
---00000---
This download link is referred from the post: JNTUH MCA 3rd Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university
--- Content provided by FirstRanker.com ---