Q1. Describe wait-die and wound-wait protocols for the deadlock prevention.
Q2. Differentiate deferred update and immediate update log based recovery methods.
Q3. Illustrate the merits and demerits of strict two-phase locking and conservative two-phase locking protocol.
Q4. prepare a detail note on any three of the given:
a) Heuristics based optimization
b) Web databases
c) Distributed databases
d) Shadow Paging
Q5. Describe the anomalies due to insertion, updation and deletion in a relation which is not in 2NF. Describe with the help of an illustration.