0% found this document useful (0 votes)
11 views7 pages

Overview of Database Management Systems

The document provides an overview of Database Management Systems (DBMS), detailing its definition, advantages, and various components such as the Three-Level Architecture, Data Independence, and the Entity Relationship Model. It also covers normalization, types of keys, transactions with ACID properties, SQL commands, concurrency control, deadlocks, backup and recovery techniques, the relational model, integrity constraints, file organization techniques, and database security measures. Each section highlights key concepts and their significance in managing databases effectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views7 pages

Overview of Database Management Systems

The document provides an overview of Database Management Systems (DBMS), detailing its definition, advantages, and various components such as the Three-Level Architecture, Data Independence, and the Entity Relationship Model. It also covers normalization, types of keys, transactions with ACID properties, SQL commands, concurrency control, deadlocks, backup and recovery techniques, the relational model, integrity constraints, file organization techniques, and database security measures. Each section highlights key concepts and their significance in managing databases effectively.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

1) Define DBMS. Explain its advantages.

(7 Marks)
A Database Management System (DBMS) is software that enables users to define, create,
maintain and control access to databases.

Advantages of DBMS:

1. Reduced Data Redundancy – Duplicate data is minimized


2. Improved Data Consistency – Same data across all applications
3. Data Security – Authorized access through privileges
4. Data Sharing – Multiple users can access data simultaneously
5. Data Integrity – Accuracy and correctness of data
6. Backup and Recovery – Protection against data loss
7. Data Independence – Changes do not affect applications

2) Explain Three-Level Architecture of DBMS. (7 Marks)


The Three-Level Architecture separates user view from physical storage.

Levels:

External Level

 User-specific views
 Enhances security

Conceptual Level

 Logical structure of database


 Defines entities, attributes, relationships

Internal Level

 Physical storage of data


 File organization and indexing

Advantages:

 Data abstraction
 Data independence
 Better security and maintenance
3) What is Data Independence? Explain its types. (7 Marks)
Data Independence refers to the ability to change database schema without affecting application
programs.

Types:

Physical Data Independence

 Change in physical storage does not affect logical level


 Example: Changing file structure

Logical Data Independence

 Change in logical schema does not affect external view


 Example: Adding a new attribute

Importance:

 Easy database modification


 Reduced maintenance cost

4) Explain ER Model and its components. (7 Marks)


The Entity Relationship (ER) Model represents real-world objects and their relationships.

Components:

1. Entity – Real-world object (Student)


2. Attribute – Properties of entity (Name, Roll No)
3. Relationship – Association between entities
4. Cardinality – One-to-One, One-to-Many, Many-to-Many

Advantages:

 Simple design
 Easy to understand
 Useful for database modeling
5) What is Normalization? Explain 1NF, 2NF, and 3NF. (7
Marks)
Normalization organizes data to reduce redundancy.

1NF:

 Atomic values
 No repeating groups

2NF:

 In 1NF
 No partial dependency

3NF:

 In 2NF
 No transitive dependency

Advantages:

 Reduces redundancy
 Improves data integrity

6) Explain Types of Keys in DBMS. (7 Marks)


Types of Keys:

1. Primary Key – Unique and not NULL


2. Candidate Key – Possible primary keys
3. Alternate Key – Candidate key not selected
4. Foreign Key – References primary key of another table
5. Composite Key – Multiple attributes
6. Super Key – Unique identifier
7) What is a Transaction? Explain ACID properties. (7
Marks)
A Transaction is a sequence of operations executed as a single unit.

ACID Properties:

1. Atomicity – All or nothing


2. Consistency – Valid state transition
3. Isolation – Independent execution
4. Durability – Permanent changes

8) Explain SQL and its types of commands. (7 Marks)


SQL is used to manage relational databases.

Types:

1. DDL – CREATE, DROP, ALTER


2. DML – INSERT, UPDATE, DELETE
3. DQL – SELECT
4. DCL – GRANT, REVOKE
5. TCL – COMMIT, ROLLBACK

9) Explain Concurrency Control in DBMS. (7 Marks)


Concurrency control ensures correct execution of transactions.

Problems:

 Lost Update
 Dirty Read
 Inconsistent Data

Techniques:

 Lock-based protocol
 Timestamp-based protocol
 Two-phase locking (2PL)
10) Explain Deadlock in DBMS. (7 Marks)
Deadlock occurs when transactions wait indefinitely for each other.

Conditions:

1. Mutual Exclusion
2. Hold and Wait
3. No Preemption
4. Circular Wait

Prevention:

 Deadlock detection
 Deadlock avoidance
 Deadlock recovery

11) Explain Backup and Recovery techniques. (7 Marks)


Backup:

 Copy of database for safety

Types:

 Full backup
 Incremental backup
 Differential backup

Recovery Techniques:

 Log-based recovery
 Checkpointing
 Shadow paging
12) Explain Relational Model in DBMS. (7 Marks)
The Relational Model organizes data in tables (relations).

Components:

 Rows (Tuples)
 Columns (Attributes)
 Keys

Advantages:

 Simple structure
 Easy querying
 Data integrity

13) Explain Integrity Constraints in DBMS. (7 Marks)


Integrity constraints ensure correctness of data.

Types:

1. Domain Constraint
2. Entity Integrity
3. Referential Integrity
4. Key Constraint

14) Explain File Organization techniques. (7 Marks)


Types:

1. Sequential File
2. Indexed File
3. Direct (Hash) File

Comparison:

 Access speed
 Storage efficiency
 Use cases
15) Explain Database Security in DBMS. (7 Marks)
Security Measures:

1. Authentication
2. Authorization
3. Encryption
4. Access Control
5. Audit Trails

Importance:

 Prevents unauthorized access


 Protects sensitive data

You might also like