Ics2401:Transaction Processing System Question Paper

Ics2401:Transaction Processing System 

Course:Bachelor Of Information Technology

Institution: Meru University Of Science And Technology question papers

Exam Year:2014



1
QUESTION ONE – 30 MARKS
a. Briefly define transaction processing system. (2 Marks) b. Discuss any three causes of database failure (6 Marks) c. Explain the properties of transaction processing system. (10 Marks) d. Construct the wait-for-graph for a schedule of your choice. (4 Marks) e. What is a serial schedule, a serializable schedule, and a non-serializable schedule? (6 Marks) f. Discuss the concept of nested transactions. (2 Marks)
QUESTION TWO – 20 MARKS
a. Describe two phase locking protocol and explain how the problem of cascading roll back can be solved. (4 Marks) b. If deadlocks are avoided, is starvation still possible? State a short example and explain your answer. (4 Marks) i. What is the purpose of a lock table and how is it implemented in locking protocols. (4 Marks)
ii. Explain the differences between wait die and wound wait schemes on deadlock management. (4 Marks)
2
c. Consider the following schedules: Schedule 1 T1 T2 T3 read(B) read(A) write(B) read(B) read(C) write(C) read(C) read(A) write(A)
Schedule 2 T1 T2 T3 T4 read(A) read(A) read(B) read(B) read(A) write(A) read(A) write(B)
For each of these schedules, draw the precedence graph for the schedule. (4 Marks)
QUESTION THREE – 20 MARKS
a. Describe what is generally known as “the lost update” problem. Give an example of two concurrent transactions that generate a lost update. (10 Marks) b. Discuss the concept of granularits of data item control. Show how it can be applied in concurrency citing the pros and cons of coarse and fine granularity. (5 Marks) c. Discuss poles played by TP monitor in a TPS. (5 Marks)
QUESTION FOUR – 20 MARKS
a. Using a diagram describe transaction state that can be assumed. (6 Marks) b. Distinguish between conflict serializability and view serializability. (4 Marks) c. Outline the three phases of validation based protocols and state how serializability would be determined. (4 Marks) d. Using examples discuss three main database recovery techniques. (6 Marks)
3
QUESTION FIVE – 20 MARKS
a. Referential integrity is a form of integrity constraint that ensures that all non-null values that appear in a certain column A of a table R must also appear in a column B of a table S. Table S is called the parent table, and table R is called the child table. When a user attempts to update a row in the parent table and there are matching rows in the child tables SQL supports four possible outcomes. Describe the four possible outcomes. (8 Marks)
b. Triggers can be used in oracle to enforce enterprise constraints. They are often called event condition action rules. Describe what the event, the condition and the action are. (5 Marks)
c. Consider a database with the following relations: Manages (employee-name, manager-name) Employee (employee-name, street, city)
Write an oracle trigger to carry out the following action: after insert on the table employee, check if the employee name is present in the table manages and insert it if not (with a null manager name) (7 Marks)






More Question Papers


Popular Exams


Mid Term Exams

End Term 1 Exams

End Term 3 Exams

Opener Exams

Full Set Exams



Return to Question Papers