State True or False:
[7 marks]Concurrent execution executes the transactions one after other. (ii) Materialized view’s contents are computed and stored. (iii) Deferred update technique does not require maintaining the old value in the update log. (iv) Strict 2PL requires all locks to be held until the transaction commits.
[ marks]Audit trial is a special file that automatically keeps track of all operations performed by the users. (vi) Throughput of a Transaction will be improved by concurrent execution. (vii) In database recovery, the point of synchronization between the database and the log file is called checkpoint.
[ marks]Do as directed:
[ marks]_______ is a phenomenon in which single transaction leads to series of transaction rollback. (ii) ______ is a mechanism to determine whether the user is valid user or 01 not. (iii) Define Query Optimization. 01 (iv) Write short notes on View serializability?
[2 marks]Describe briefly about Shadow paging.
[2 marks](i) Describe any 3 types of Database Failures. (ii) Describe the ACID properties of a Transaction, briefly.
[4 marks](i) Why do we need concurrent execution? Discuss. (ii) Define Transaction. Describe the various states of a Transaction with a State Diagram.
[3 marks](i) Explain how the Shadow copy scheme is used to implement the Atomicity and Durability. (ii) Give any 3 Equivalence rules of Query Optimization. Describe briefly.
[3 marks]Define Deadlock. Discuss the Deadlock prevention and Detection methods.
[7 marks]What do you mean by Serializability? Explain Conflict Serializability.
[7 marks]Why Database recovery is needed? Explain how Immediate database modification technique is implemented using Log based recovery. Give example.
[7 marks]Explain how the Query processing is done in sorting. Describe using the External merge-sort algorithm.
[7 marks]Define Lock. Show Lock compatibility matrix and Explain 2PL.
[7 marks](i) Describe any 4 Threats to Database security. (ii) Write short notes on Phantom phenomenon. OR1
[3 marks]Define Query Processing. Explain the steps involved in Query processing with a neat diagram.
[7 marks](i) Write short notes on the use of Firewalls in Database security. (ii) Write short notes on cascade-less schedule.
[3 marks]Discuss the Features, Advantages and Disadvantages of Object-oriented database.
[7 marks]Explain the Discretionary access control in database security.
[7 marks]What is Distributed database? Discuss the advantages and disadvantages of the same.
[7 marks]What is Data Encryption? Discuss the various Encryption schemes used in Database security.
[7 marks]