Sunday, 26 May 2013

DBMS Questions and Answers


DBMS Questions and Answers

PrintPDF
DBMS Questions and answers 
Relational Database Model
  ER Model
   Advanced Data Modeling
Normalization
  Database Design
Transaction Management
5. Explain concurrency control with locking method. Explain with examples.
11. Explain about Transaction and Database Recovery.
Distributed Database Management Systems
  1. Describe the evolution from centralized DBMSs to distributed DBMSs.
  2. What are the advantages and disadvantages of the DDBMS?
  3. Explain the difference between a distributed database and distributed processing.
  4. What are the components of a DDBMS?
  5. Explain Different levels of data and process distribution.
  6. List and explain the transparency features of a DDBMS.
  7. Define and explain the different types of distribution transparency.
  8. Explain Transaction transparency
  9. Explain the need for the two-phase commit protocol. Then describe the two phases.
  10. What is the objective of query optimization functions?
  11. Explain distributed database design concepts.
  12. Explain the difference between distributed databases and client/server architecture.
Business Intelligence and Data Warehouses
  1. What is business intelligence?Describe the BI framework.
  2. What are the most relevant differences between operational and decision support data?
  3. What is a data warehouse, and what are its main characteristics? How does it differ from a data mart?
  4. What is OLAP, and what are its main characteristics?
  5. Explain ROLAP and give the reasons you would recommend its use in the relational database environment.
  6. Explain multidimensional cubes and describe how the slice-and-dice technique fits into this model.
  7. Explain the use of facts, dimensions, and attributes in the star schema and explain performance improvement techniques used in star schemas
  8. Explain some of the most important issues in data warehouse implementation.
  9. How does data mining work? Discuss the different phases in the data-mining process.
Database Administration and Security
  1. How can you say database is corporate asset of an organisation?
  2. Explain the role of databases in organizations (OR) Describe and contrast the information needs at the strategic, tactical, and operational levels in an organization.
  3. Describe the DBA’s responsibilities(OR) Explain managerial and Technical functionalities of DBA.
  4. How can the DBA function be placed within the organization chart? What effect(s) will that placement have on the DBA function?
  5. Explain and contrast the differences and similarities between the DBA and DA.
  6. What are security vulnerabilities? What is a security threat? Give some examples of security vulnerabilities that exist in different IS components.
  7. Explain Database Administrative tools.

Saturday, 25 May 2013

Canonical Cover

up previous
Up: Functional Dependencies Previous: Closure of Attribute Sets

Canonical Cover


  1. To minimize the number of functional dependencies that need to be tested in case of an update we may restrict F to a canonical cover tex2html_wrap_inline1324 .
  2. A canonical cover for F is a set of dependencies such that F logically implies all dependencies in tex2html_wrap_inline1324 , and vice versa.
  3. tex2html_wrap_inline1324 must also have the following properties:
    • Every functional dependency tex2html_wrap_inline1058 in tex2html_wrap_inline1324 contains no extraneous attributes in tex2html_wrap_inline958 (ones that can be removed from tex2html_wrap_inline958 without changing tex2html_wrap_inline1342 ). So A is extraneous in tex2html_wrap_inline958 if tex2html_wrap_inline1348 anddisplaymath1318
      logically implies tex2html_wrap_inline1324 .
    • Every functional dependency tex2html_wrap_inline1058 in tex2html_wrap_inline1324 contains no extraneous attributes in tex2html_wrap_inline1356 (ones that can be removed from tex2html_wrap_inline1356 without changing tex2html_wrap_inline1342 ). So A is extraneous in tex2html_wrap_inline1356 if tex2html_wrap_inline1366 anddisplaymath1319
      logically implies tex2html_wrap_inline1324 .
    • Each left side of a functional dependency in tex2html_wrap_inline1324 is unique. That is there are no two dependencies tex2html_wrap_inline1372 and tex2html_wrap_inline1374 in tex2html_wrap_inline1324 such that tex2html_wrap_inline1378 .
  4. To compute a canonical cover tex2html_wrap_inline1324 for F,

     repeat
    
          Use the union rule to replace dependencies of the form
    
    tex2html_wrap_inline1372 and tex2html_wrap_inline1386 with tex2html_wrap_inline1388 .
    Find a functional dependency tex2html_wrap_inline1058 with an
    extraneous attribute in tex2html_wrap_inline958 or in tex2html_wrap_inline1356 .
    If an extraneous attribute is found, delete it from tex2html_wrap_inline1058
    until F does not change.
  5. An example: for the relational scheme R=(A,B,C), and the set F of functional dependencies
     A  tex2html_wrap_inline1090  BC 
    
                B  tex2html_wrap_inline1090  C 
    
    A tex2html_wrap_inline1090 B
    AB tex2html_wrap_inline1090 C
    we will compute tex2html_wrap_inline1324 .

    • We have two dependencies with the same left hand side:
       A  tex2html_wrap_inline1090  BC 
      
                  A  tex2html_wrap_inline1090  B 
      
      
      We can replace these two with just tex2html_wrap_inline1090 BC .
    • A is extraneous in AB tex2html_wrap_inline1090 C because tex2html_wrap_inline1090 C logically implies AB tex2html_wrap_inline1090 C .
    • Then our set is
       A  tex2html_wrap_inline1090  BC 
      
                  B  tex2html_wrap_inline1090  C 
      
      
    • We still have an extraneous attribute on the right-hand side of the first dependency. C is extraneous in tex2html_wrap_inline1090 BC because tex2html_wrap_inline1090 B and tex2html_wrap_inline1090 C logically imply that tex2html_wrap_inline1090 BC .
    • So we end up with
       A  tex2html_wrap_inline1090  B 
      
                  B  tex2html_wrap_inline1090  C 
      
      



next up previous
Next: About this document Up: Functional Dependencies Previous: Closure of Attribute Sets
Osmar Zaiane
Tue Jun 9 15:12:55 PDT 1998