IT 202 Introductory Database | ||||||
Total hours | ||||||
Days | Chapter 1: | 5 | ||||
1 | Introduction to DBMS | |||||
Introduction to Database Management System | ||||||
DBMS vs File System | ||||||
2 | View of data | |||||
Data models | ||||||
Database Languages: DML, DDL | ||||||
3 | Database users and administrators | |||||
4 | Transaction Management | |||||
5 | Database System Structure | |||||
Application architectures | ||||||
Chapter 2: | ||||||
6 | Types of DBMS | 2 | ||||
Types of DBMS | ||||||
7 | Relational DBMS | |||||
Object-oriented Database Management System | ||||||
Chapter 3: | 5 | |||||
8 | Data Models | |||||
Basic concepts | ||||||
Constraints | ||||||
Keys | ||||||
9 | Design issues | |||||
The Entity Relationship Database Model | ||||||
Weak entity sets | ||||||
10 | Extended E-R Features | |||||
11 | Design of an E-R database schema | |||||
12 | Reduction of an R-R schema to tables | |||||
Chapter 4: | ||||||
13 | Relational Database Model | 5 | ||||
14 | Structure of relational databases (Basic Structures, Database schema, keys, Schema | |||||
15 | Diagram, query languages, joins (Natural, outer)) | |||||
16 | Data Integrity | |||||
Types of Data Integrity (Entity integrity constraint (Primary key), Referential Integrity, | ||||||
17 | Domain Constraints, triggers, assertions) | |||||
Relationships within the Relational Database | ||||||
Chapter 5: | ||||||
18 | Entity Relationship Modeling | 6 | ||||
19 | Entity Relationship modeling | |||||
20 | Entities, Attributes, Relationships | |||||
21 | Degree of a relationship | |||||
22 | Connectivity and Cardinality | |||||
23 | Specialization and Generalization Entity relationship diagram | |||||
Chapter 6: | ||||||
24 | Structured Query Language | 7 | ||||
Data Definition Language | ||||||
25 | SQL Constraints | |||||
Creating Tables | ||||||
26 | Data Manipulation Languages (Insert, Update, Delete, Select) | |||||
27 | SELECT Queries | |||||
28 | Syntax for the SELECT statement | |||||
29 | SQL Views | |||||
30 | JOIN | |||||
Chaptere 7: | ||||||
31 | Distributed Database Management Systems | 5 | ||||
32 | Characteristics of DDBMS | |||||
33 | Advantages / Disadvantages of DDBMS | |||||
34 | Components of Distributed Database system | |||||
35 | Distributed Database Design | |||||
Fragmentation (horizontal and vertical fragmentation) | ||||||
Chapter 8: | ||||||
36 | Database Security | 5 | ||||
37 | Authorization is SQL (privileges in SQL) | |||||
38 | Roles | |||||
39 | The privilege to Grant Privileges | |||||
40 | Limitations of SQL authorization | |||||
Chapter 9: | ||||||
41 | Designing Good Designed Database | 5 | ||||
Normalization | ||||||
42 | Funcational Dependencies: partial dependency, transitive dependency, join | |||||
43 | dependency, multivalued dependency | |||||
44 | Update Anamolies | |||||
45 | Normal forms: First, Second, Third, Fourth, Fifth |
Wednesday, September 16, 2020
IT 202 Introductory Database
Subscribe to:
Post Comments (Atom)
Reference
https://notesformsc.org/locks-database-management https://mycareerwise.com/content/concept-of-lossless-and-lossy-join-decomposition/content/...
-
Solve All the Questions & Answers are Below. Q 1) Display the details of all employees. Q 2) Display the depart information from dep...
-
Database Management System Questions and Answers Our 1000+ Database Management System questions and answers focus...
Great post with unique information About School Database Management System
ReplyDelete