Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Illustrate the fields in which clustering methods are used? Illustrate any four fields. Describe fundamental requirements of the cluster analysis.
Describe in details three main reasons why the data warehouse modeling needs modeling methods other than OLTP database modeling.
What do you mean by the term Constraint-Based Association Mining?
What do you understand by software and hardware RAID systems?
What is a shadow copy scheme? What do you mean by access time, seek time and average seek time.
Describe in about Boyce code normal form and fifth normalization form with suitable example. Explain detail in decomposition using Functional Dependencies.
What do you mean by shared lock and Exclusive lock? What is meant by transaction rollback?
Describe String Operations and Aggregate functions used in SQL. Describe detail in domain relational calculus.
Write down the difference between RDBMS and OODBMS. Describe the concept of class, Abstraction, Encapsulation and inheritances. How do we make objects persist in OODBMS?
Explain different data types and operators in ORACLE. What is the function of cursors?
What are the various types of integrity constraints? Describe referential integrity constraints.
What do you mean by E-R model? What are the different symbols used to draw E-R diagram? Draw E-R diagram for the following organizations: Public Library, Educational Institute and Hospital.
Describe decomposition of a database in database design. Why consolidation of database after normalization is considered during designing a database.
What do you mean by a system log? What is the purpose of the system log in system recovery?
When does a server Roll Forward and rollback a Transaction. What is a Transaction? What are the properties of a Transaction? What are different transaction states?
Write down the difference between tuple relational calculus and domain relational calculus?
What is structured query language? How the DDL and DML are different? Describe.
Write down the difference between the strong entity set and weak entity set?
Sketch a Privacy preserving clustering method so that a data owner would be able to ask third party to mine the data for quality clustering without worrying about the potential inappropriate disclos
Write down three application examples of spatiotemporal data mining. Identify and explain the main challenges in spatiotemporal data mining.
Describe the concepts of Horizontal Fragmentation and Vertical Fragmentation.
Explain how does SQL implement the entity integrity and referential integrity constraints of the relational data model? Describe with an illustration.
Illustrate the difference between the procedural and non-procedural DMLs?
Describe the characteristic aspects of RISC and CISC processor. State the conditions in which RISC and CISC processors are preferable.
What do you mean by cache coherence? How can the problem are solved with a snoopy cache controller?